Anomaly detection from network logs using diffusion maps

DSpace/Manakin Repository

Show simple item record

dc.contributor.author Sipola, Tuomo
dc.contributor.author Juvonen, Antti
dc.contributor.author Lehtonen, Joel
dc.date.accessioned 2012-06-05T09:10:09Z
dc.date.available 2012-06-05T09:10:09Z
dc.date.issued 2011
dc.identifier.citation Sipola, T., Juvonen, A., & Lehtonen, J. (2011). Anomaly detection from network logs using diffusion maps. In L. Iliadis, & C. Jayne (Eds.), Engineering Applications of Neural Networks (pp. 172-181). IFIP Advances in Information and Communication Technology (363). Boston: Springer. doi:10.1007/978-3-642-23957-1_20 Retrieved from http://www.springerlink.com/index/N615170400W21N13.pdf fi
dc.identifier.isbn 978-3-642-23956-4
dc.identifier.issn 1868-4238
dc.identifier.other TUTKAID_46410
dc.identifier.uri http://hdl.handle.net/123456789/37967
dc.description.abstract The goal of this study is to detect anomalous queries from network logs using a dimensionality reduction framework. The fequencies of 2-grams in queries are extracted to a feature matrix. Dimensionality reduction is done by applying diffusion maps. The method is adaptive and thus does not need training before analysis. We tested the method with data that includes normal and intrusive traffic to a web server. This approach finds all intrusions in the dataset.
dc.language.iso eng
dc.publisher Springer
dc.relation.ispartofseries IFIP Advances in Information and Communication Technology
dc.relation.uri http://www.springerlink.com/index/N615170400W21N13.pdf
dc.rights © Springer. This is an electronic final draft version of an article whose final and definitive form has been published by Springer.
dc.subject.other hyökkäyksen havaitseminen fi
dc.subject.other poikkeavuuden havaitseminen fi
dc.subject.other n-grammit fi
dc.subject.other diffuusiokartta fi
dc.subject.other tiedonlouhinta fi
dc.subject.other koneoppiminen fi
dc.subject.other intrusion detection fi
dc.subject.other anomaly detection fi
dc.subject.other n-grams fi
dc.subject.other diffusion map fi
dc.subject.other data mining fi
dc.subject.other machine learning fi
dc.title Anomaly detection from network logs using diffusion maps
dc.type Conference paper en
dc.identifier.urn URN:NBN:fi:jyu-201206051800
dc.subject.kota 111, 112, 113
dc.contributor.laitos Tietotekniikan laitos
dc.contributor.oppiaine tietotekniikka fi
jyx.tutka.ksname Engineering Applications of Neural Networks
jyx.tutka.pagetopage 172-181
dc.type.uri http://purl.org/eprint/type/ConferencePaper
dc.identifier.doi 10.1007/978-3-642-23957-1_20
dc.date.updated 2012-06-05T03:30:05Z
dc.description.version Author's Final draft
eprint.status http://purl.org/eprint/type/status/PeerReviewed

This item appears in the following Collection(s)

Show simple item record