• DocumentCode
    2691938
  • Title

    Anomaly detection

  • Author

    Lin, T.Y.

  • Author_Institution
    San Jose State University
  • fYear
    1994
  • fDate
    3-5 Aug. 1994
  • Firstpage
    44
  • Lastpage
    53
  • Abstract
    Computer are finite discrete machines, the set of real numbers is an infinite continuum. So real numbers in computers are approximation. Rough set theory is the underlying mathematics. A \´computer\´ version of Weistrass theorem states that every sequence, within the radius of error, repeats certain terms infinitely many times. In terms of applications, the theorem guarantees that the audit trail has repeating patterns. Examining further, based on fuzzy-rough set theory, hidden fuzzy relationships (rules) in audit data are uncovered. The information about the repeating data and fuzzy relationships reflect "unconscious patterns" of users\´ habits. They are some deeper "signatures" of computer users, which provide a foundation to detect abuses and misuses of computer systems, A "sliding window information system" is used to illustrate the detection of a \´simple\´ virus attack. The complexity problem is believed to be controllable via rough set representation of data.
  • Keywords
    Application software; Computer errors; Computer science; Fuzzy set theory; Fuzzy sets; Genetic communication; Information systems; Information theory; Mathematics; Set theory;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    New Security Paradigms Workshop, 1994. Proceedings., 1994 ACM SIGSAC
  • Conference_Location
    Little Compton, RI
  • Print_ISBN
    0-8186-6335-9
  • Type

    conf

  • DOI
    10.1109/NSPW.1994.656226
  • Filename
    656226