Repository logo
Log In(current)
  1. Home
  2. Colleges & Schools
  3. Graduate School
  4. Doctoral Dissertations
  5. Differentiated Intrusion Detection and SVDD-based Feature Selection for Anomaly Detection
Details

Differentiated Intrusion Detection and SVDD-based Feature Selection for Anomaly Detection

Date Issued
August 1, 2007
Author(s)
Kang, Inho
Advisor(s)
Dongjoon Kong, Myong K. Jeong
Additional Advisor(s)
Xueping Li, Frank Guess
Link to full text
http://etd.utk.edu/2007/KangInho.pdf
Permanent URI
https://trace.tennessee.edu/handle/20.500.14382/23045
Abstract

Most of existing intrusion detection techniques treat all types of attacks equally without any differentiation of the risk they pose to the information system. However, certain types of attacks are more harmful than others and their detection is critical to protection of the system. This study proposes a novel differentiated anomaly detection method that can more precisely detect intrusions of specific types of attacks.


Although many researchers have been developed many efficient intrusion detection methods, fewer efforts have been made to extract effective features for host-based intrusion detection. In this study, we propose a new framework based on new viewpoints about system activities to extract host-based features, which can guide further exploration for new features.

There are few feature selection methods for anomaly detections although lots of studies have been done for the feature selection both in classification and regression problems. This study proposes new support vector data description (SVDD)-based feature selection methods such as SVDD-R2-recursive feature elimination (RFE), SVDD-RFE and SVDDGradient method. Concrete experiments with both simulated and the Defense advanced research projects agency (DARPA) datasets shows promising performance of the proposed methods.

These achievements in this dissertation could significantly contribute to anomaly detection field. In addition, the proposed differentiated detection and SVDD-based feature selection methods would benefit even other application areas beyond intrusion detection

Disciplines
Engineering
Degree
Doctor of Philosophy
Major
Industrial Engineering
Embargo Date
December 1, 2011
File(s)
Thumbnail Image
Name

KangInho.pdf

Size

1.6 MB

Format

Adobe PDF

Checksum (MD5)

016261a5e37644cedee2e09b4b855e6a

Built with DSpace-CRIS software - Extension maintained and optimized by 4Science

  • Privacy policy
  • End User Agreement
  • Send Feedback
  • Contact
  • Libraries at University of Tennessee, Knoxville
Repository logo COAR Notify