DocumentCode :
2691938
Title :
Anomaly detection
Author :
Lin, T.Y.
Author_Institution :
San Jose State University
fYear :
1994
fDate :
3-5 Aug. 1994
Firstpage :
44
Lastpage :
53
Abstract :
Computer are finite discrete machines, the set of real numbers is an infinite continuum. So real numbers in computers are approximation. Rough set theory is the underlying mathematics. A \´computer\´ version of Weistrass theorem states that every sequence, within the radius of error, repeats certain terms infinitely many times. In terms of applications, the theorem guarantees that the audit trail has repeating patterns. Examining further, based on fuzzy-rough set theory, hidden fuzzy relationships (rules) in audit data are uncovered. The information about the repeating data and fuzzy relationships reflect "unconscious patterns" of users\´ habits. They are some deeper "signatures" of computer users, which provide a foundation to detect abuses and misuses of computer systems, A "sliding window information system" is used to illustrate the detection of a \´simple\´ virus attack. The complexity problem is believed to be controllable via rough set representation of data.
Keywords :
Application software; Computer errors; Computer science; Fuzzy set theory; Fuzzy sets; Genetic communication; Information systems; Information theory; Mathematics; Set theory;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
New Security Paradigms Workshop, 1994. Proceedings., 1994 ACM SIGSAC
Conference_Location :
Little Compton, RI
Print_ISBN :
0-8186-6335-9
Type :
conf
DOI :
10.1109/NSPW.1994.656226
Filename :
656226
Link To Document :
بازگشت