Näytä suppeat kuvailutiedot

dc.contributor.authorSipola, Tuomo
dc.contributor.authorJuvonen, Antti
dc.contributor.authorLehtonen, Joel
dc.date.accessioned2012-06-05T09:10:09Z
dc.date.available2012-06-05T09:10:09Z
dc.date.issued2011
dc.identifier.citationSipola, T., Juvonen, A., & Lehtonen, J. (2011). Anomaly detection from network logs using diffusion maps. In L. Iliadis, & C. Jayne (Eds.), <em>Engineering Applications of Neural Networks</em> (pp. 172-181). IFIP Advances in Information and Communication Technology (363). Boston: Springer. <a href="http://dx.doi.org/10.1007/978-3-642-23957-1_20">doi:10.1007/978-3-642-23957-1_20</a> Retrieved from <a href="http://www.springerlink.com/index/N615170400W21N13.pdf">http://www.springerlink.com/index/N615170400W21N13.pdf</a>fi
dc.identifier.isbn978-3-642-23956-4
dc.identifier.otherTUTKAID_46410
dc.identifier.urihttps://jyx.jyu.fi/handle/123456789/37967
dc.description.abstractThe goal of this study is to detect anomalous queries from network logs using a dimensionality reduction framework. The fequencies of 2-grams in queries are extracted to a feature matrix. Dimensionality reduction is done by applying diffusion maps. The method is adaptive and thus does not need training before analysis. We tested the method with data that includes normal and intrusive traffic to a web server. This approach finds all intrusions in the dataset.
dc.language.isoeng
dc.publisherSpringer
dc.relation.ispartofEngineering Applications of Neural Networks
dc.relation.ispartofseriesIFIP Advances in Information and Communication Technology
dc.relation.urihttp://www.springerlink.com/index/N615170400W21N13.pdf
dc.subject.otherhyökkäyksen havaitseminenfi
dc.subject.otherpoikkeavuuden havaitseminenfi
dc.subject.othern-grammitfi
dc.subject.otherdiffuusiokarttafi
dc.subject.othertiedonlouhintafi
dc.subject.otherkoneoppiminenfi
dc.subject.otherintrusion detectionfi
dc.subject.otheranomaly detectionfi
dc.subject.othern-gramsfi
dc.subject.otherdiffusion mapfi
dc.subject.otherdata miningfi
dc.subject.othermachine learningfi
dc.titleAnomaly detection from network logs using diffusion maps
dc.typeConference paper
dc.identifier.urnURN:NBN:fi:jyu-201206051800
dc.contributor.laitosTietotekniikan laitos
dc.contributor.oppiaineTietotekniikkafi
dc.type.urihttp://purl.org/eprint/type/ConferencePaper
dc.identifier.doi10.1007/978-3-642-23957-1_20
dc.date.updated2012-06-05T03:30:05Z
dc.type.coarconference paper
dc.description.reviewstatuspeerReviewed
dc.format.pagerange172-181
dc.relation.issn1868-4238
dc.type.versionacceptedVersion
dc.rights.copyright© Springer. This is an electronic final draft version of an article whose final and definitive form has been published by Springer.
dc.rights.accesslevelopenAccessfi


Aineistoon kuuluvat tiedostot

Thumbnail

Aineisto kuuluu seuraaviin kokoelmiin

Näytä suppeat kuvailutiedot