Show simple item record

dc.contributor.authorSipola, Tuomo
dc.contributor.authorJuvonen, Antti
dc.contributor.authorLehtonen, Joel
dc.date.accessioned2013-02-26T09:24:34Z
dc.date.available2013-02-26T09:24:34Z
dc.date.issued2012
dc.identifier.citationSipola, T., Juvonen, A., & Lehtonen, J. (2012). Dimensionality reduction framework for detecting anomalies from network logs. <i>Engineering Intelligent Systems</i>, <i>20</i>(1/2), 87-97.
dc.identifier.otherCONVID_21505967
dc.identifier.urihttps://jyx.jyu.fi/handle/123456789/40988
dc.description.abstractDynamic web services are vulnerable to multitude of intrusions that could be previously unknown. Server logs contain vast amounts of information about network traffic, and finding attacks from these logs improves the security of the services. In this research features are extracted from HTTP query parameters using 2-grams. We propose a framework that uses dimensionality reduction and clustering to identify anomalous behavior. The framework detects intrusions from log data gathered from a real network service. This approach is adaptive, works on the application layer and reduces the number of log lines that needs to be inspected. Furthermore, the traffic can be visualized.fi
dc.language.isoeng
dc.publisherCRL Publishing
dc.relation.ispartofseriesEngineering Intelligent Systems
dc.relation.urihttp://www.crlpublishing.co.uk/journal.asp?j=eis&s=Aims and Scope
dc.subject.othertunkeutumisen havaitseminen
dc.subject.otherpoikkeavuuden havaitseminen
dc.subject.othern-grammit
dc.subject.otherdiffuusiokartta
dc.subject.otherintrusion detection
dc.subject.otheranomaly detection
dc.subject.othern-grams
dc.subject.otherdiffusion map
dc.titleDimensionality reduction framework for detecting anomalies from network logs
dc.typeresearch article
dc.identifier.urnURN:NBN:fi:jyu-201210122663
dc.contributor.laitosTietotekniikan laitosfi
dc.contributor.laitosDepartment of Mathematical Information Technologyen
dc.contributor.oppiaineTietotekniikkafi
dc.contributor.oppiaineMathematical Information Technologyen
dc.type.urihttp://purl.org/eprint/type/JournalArticle
dc.date.updated2012-10-12T03:30:04Z
dc.type.coarhttp://purl.org/coar/resource_type/c_2df8fbb1
dc.description.reviewstatuspeerReviewed
dc.format.pagerange87-97
dc.relation.issn1472-8915
dc.relation.numberinseries1/2
dc.relation.volume20
dc.type.versionacceptedVersion
dc.rights.copyright© 2012 CRL Publishing Ltd. This is an author's postprint version of on article whose final and definitive form has been published by CRL Publsihing.
dc.rights.accesslevelopenAccessfi
dc.type.publicationarticle
dc.subject.ysotiedonlouhinta
dc.subject.ysokoneoppiminen
jyx.subject.urihttp://www.yso.fi/onto/yso/p5520
jyx.subject.urihttp://www.yso.fi/onto/yso/p21846
dc.type.okmA1


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record