Detailed Information

Cited 0 time in webofscience Cited 0 time in scopus
Metadata Downloads

Self-similarity based lightweight intrusion detection method

Full metadata record
DC Field Value Language
dc.contributor.authorKwon, Hyukmin-
dc.contributor.authorKim, Eunjin-
dc.contributor.authorYu, Song Jin-
dc.contributor.authorKim, Huy Kang-
dc.date.accessioned2021-09-07T06:28:45Z-
dc.date.available2021-09-07T06:28:45Z-
dc.date.created2021-06-19-
dc.date.issued2011-11-
dc.identifier.issn1343-4500-
dc.identifier.urihttps://scholar.korea.ac.kr/handle/2021.sw.korea/111193-
dc.description.abstractThere are many security concerns such as data leakage, unauthorized access from outside the system and abnormal activities from inside the system. To detect these system's abnormal activities or misuse by malicious attackers, intrusion detection system (IDS) is usually adopted. Even though detection algorithms and their performance are improved, IDS still consume system resources not ignorable. For providing high performance computing environment, lightweight anomaly detection method is needed today. In this paper, we propose self-similarity measures for lightweight IDS. For normal systems, a regular and periodic self-similarity can be observed in a system's internal activities such as system calls and process status. On the other hand, outliers occur when an anomalous attack happens, and then the system's self-similarity cannot be maintained. Therefore monitoring the changes of a system's self-similarity can be used to detect the system's anomalies. From this viewpoint, we developed a new measure based on cosine similarity and found the optimal time interval for estimating the self-similarity of a given system. As a result, we can detect abnormal activities using only a few resources.-
dc.languageEnglish-
dc.language.isoen-
dc.publisherINT INFORMATION INST-
dc.titleSelf-similarity based lightweight intrusion detection method-
dc.typeArticle-
dc.contributor.affiliatedAuthorKim, Huy Kang-
dc.identifier.scopusid2-s2.0-84860113121-
dc.identifier.wosid000299027100014-
dc.identifier.bibliographicCitationINFORMATION-AN INTERNATIONAL INTERDISCIPLINARY JOURNAL, v.14, no.11, pp.3683 - 3690-
dc.relation.isPartOfINFORMATION-AN INTERNATIONAL INTERDISCIPLINARY JOURNAL-
dc.citation.titleINFORMATION-AN INTERNATIONAL INTERDISCIPLINARY JOURNAL-
dc.citation.volume14-
dc.citation.number11-
dc.citation.startPage3683-
dc.citation.endPage3690-
dc.type.rimsART-
dc.type.docTypeArticle-
dc.description.journalClass1-
dc.description.journalRegisteredClassscie-
dc.description.journalRegisteredClassscopus-
dc.relation.journalResearchAreaEngineering-
dc.relation.journalWebOfScienceCategoryEngineering, Multidisciplinary-
dc.subject.keywordAuthorinformation security-
dc.subject.keywordAuthorself-similarity-
dc.subject.keywordAuthorlightweight-
dc.subject.keywordAuthorintrusion detection-
dc.subject.keywordAuthoranomaly detection-
Files in This Item
There are no files associated with this item.
Appears in
Collections
School of Cyber Security > Department of Information Security > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Altmetrics

Total Views & Downloads

BROWSE