Näytä suppeat kuvailutiedot

dc.contributor.authorJuvonen, Antti
dc.contributor.authorSipola, Tuomo
dc.date.accessioned2014-04-04T07:40:21Z
dc.date.available2014-04-04T07:40:21Z
dc.date.issued2013
dc.identifier.citationJuvonen, A., & Sipola, T. (2013). Combining conjunctive rule extraction with diffusion maps for network intrusion detection. In <i>The Eighteenth IEEE Symposium on Computers and Communications</i> (pp. 411-416). IEEE. International Symposium on Computers and Communications. <a href="https://doi.org/10.1109/ISCC.2013.6754981" target="_blank">https://doi.org/10.1109/ISCC.2013.6754981</a>
dc.identifier.otherCONVID_22502302
dc.identifier.otherTUTKAID_57191
dc.identifier.urihttps://jyx.jyu.fi/handle/123456789/43173
dc.description.abstractNetwork security and intrusion detection are important in the modern world where communication happens via information networks. Traditional signature-based intrusion detection methods cannot find previously unknown attacks. On the other hand, algorithms used for anomaly detection often have black box qualities that are difficult to understand for people who are not algorithm experts. Rule extraction methods create interpretable rule sets that act as classifiers. They have mostly been combined with already labeled data sets. This paper aims to combine unsupervised anomaly detection with rule extraction techniques to create an online anomaly detection framework. Unsupervised anomaly detection uses diffusion maps and clustering for labeling an unknown data set. Rule sets are created using conjunctive rule extraction algorithm. This research suggests that the combination of machine learning methods and rule extraction is a feasible way to implement network intrusion detection that is meaningful to network administrators.
dc.language.isoeng
dc.publisherIEEE
dc.relation.ispartofThe Eighteenth IEEE Symposium on Computers and Communications
dc.relation.ispartofseriesInternational Symposium on Computers and Communications
dc.subject.othertunkeutumisen havaitseminen
dc.subject.otherpoikkeavuuden havaitseminen
dc.subject.othern-grammi
dc.subject.othersääntöjen erottaminen
dc.subject.otherdiffuusiokartta
dc.subject.othertiedon louhinta
dc.subject.otherintrusion detection
dc.subject.otheranomaly detection
dc.subject.othern-gram
dc.subject.otherrule extraction
dc.subject.otherdiffusion map
dc.titleCombining conjunctive rule extraction with diffusion maps for network intrusion detection
dc.typeconferenceObject
dc.identifier.urnURN:NBN:fi:jyu-201404031456
dc.contributor.laitosTietotekniikan laitosfi
dc.contributor.laitosDepartment of Mathematical Information Technologyen
dc.contributor.oppiaineTietotekniikkafi
dc.contributor.oppiaineMathematical Information Technologyen
dc.type.urihttp://purl.org/eprint/type/ConferencePaper
dc.date.updated2014-04-03T03:30:07Z
dc.relation.isbn978-1-4799-3755-4
dc.type.coarhttp://purl.org/coar/resource_type/c_5794
dc.description.reviewstatuspeerReviewed
dc.format.pagerange411-416
dc.relation.issn1530-1346
dc.type.versionacceptedVersion
dc.rights.copyright© 2013 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses. This is the authors’ postprint version of the article. The original print version appeared as: A. Juvonen and T. Sipola, “Combining conjunctive rule extraction with diffusion maps for network intrusion detection,” in In The Eighteenth IEEE Symposium on Computers and Communications (ISCC 2013). IEEE 2013.
dc.rights.accesslevelopenAccessfi
dc.relation.conferenceInternational Symposium on Computers and Communications
dc.subject.ysokoneoppiminen
dc.subject.ysotiedonlouhinta
jyx.subject.urihttp://www.yso.fi/onto/yso/p21846
jyx.subject.urihttp://www.yso.fi/onto/yso/p5520
dc.relation.doi10.1109/ISCC.2013.6754981
dc.type.okmA4


Aineistoon kuuluvat tiedostot

Thumbnail

Aineisto kuuluu seuraaviin kokoelmiin

Näytä suppeat kuvailutiedot