Intrusion Detection Based on Sequential Information Preserving Log Embedding Methods and Anomaly Detection Algorithms
Previous methods for system intrusion detection have mainly consisted of those based on pattern matching that employs prior knowledge extracted from experts’ domain knowledge. However, pattern matching-based methods have a major drawback that it can be bypassed through various modified te...
Main Authors: | Czangyeob Kim, Myeongjun Jang, Seungwan Seo, Kyeongchan Park, Pilsung Kang |
---|---|
Format: | Article |
Language: | English |
Published: |
IEEE
2021-01-01
|
Series: | IEEE Access |
Subjects: | |
Online Access: | https://ieeexplore.ieee.org/document/9399070/ |
Similar Items
-
Container intrusion detection method based on host system call frequency
by: JI Yimu, LIU Shangdong, et al.
Published: (2021-08-01) -
Towards a better similarity algorithm for host-based intrusion detection system
by: Ouarda Lounis, et al.
Published: (2023-04-01) -
A flexible approach for cyber threat hunting based on kernel audit records
by: Fengyu Yang, et al.
Published: (2022-06-01) -
TransSentLog: Interpretable Anomaly Detection Using Transformer and Sentiment Analysis on Individual Log Event
by: Tuan-Anh Pham, et al.
Published: (2023-01-01) -
Analysis and Characterization of Cyber Threats Leveraging the MITRE ATT&CK Database
by: Bader Al-Sada, et al.
Published: (2024-01-01)