DocumentCode
2691938
Title
Anomaly detection
Author
Lin, T.Y.
Author_Institution
San Jose State University
fYear
1994
fDate
3-5 Aug. 1994
Firstpage
44
Lastpage
53
Abstract
Computer are finite discrete machines, the set of real numbers is an infinite continuum. So real numbers in computers are approximation. Rough set theory is the underlying mathematics. A \´computer\´ version of Weistrass theorem states that every sequence, within the radius of error, repeats certain terms infinitely many times. In terms of applications, the theorem guarantees that the audit trail has repeating patterns. Examining further, based on fuzzy-rough set theory, hidden fuzzy relationships (rules) in audit data are uncovered. The information about the repeating data and fuzzy relationships reflect "unconscious patterns" of users\´ habits. They are some deeper "signatures" of computer users, which provide a foundation to detect abuses and misuses of computer systems, A "sliding window information system" is used to illustrate the detection of a \´simple\´ virus attack. The complexity problem is believed to be controllable via rough set representation of data.
Keywords
Application software; Computer errors; Computer science; Fuzzy set theory; Fuzzy sets; Genetic communication; Information systems; Information theory; Mathematics; Set theory;
fLanguage
English
Publisher
ieee
Conference_Titel
New Security Paradigms Workshop, 1994. Proceedings., 1994 ACM SIGSAC
Conference_Location
Little Compton, RI
Print_ISBN
0-8186-6335-9
Type
conf
DOI
10.1109/NSPW.1994.656226
Filename
656226
Link To Document