Constructing a Multilayered Boundary to Defend against Intrusive Anomalies(Application Information Security)
スポンサーリンク
概要
- 論文の詳細を見る
We propose a model for constructing a multilayered boundary in an information system to defend against intrusive anomalies by correlating a number of parametric anomaly detectors. The model formulation is based on two observations. First, anomaly detectors differ in their detection coverage or blind spots. Second, operating environments of the anomaly detectors reveal different information about system anomalies. The correlation among observation-specific anomaly detectors is first formulated as a Partially Observable Markov Decision Process, and then a policy-gradient reinforcement learning algorithm is developed for an optimal cooperation search, with the practical objectives being broader overall detection coverage and fewer false alerts. A host-based experimental scenario is developed to illustrate the principle of the model and to demonstrate its performance.
- 一般社団法人電子情報通信学会の論文
- 2007-02-01
著者
-
Shen Hong
Graduate School Of Information Science Japan Advanced Institute Of Science And Technology
-
Shen Hong
Graduate School And Information Science Japan Advanced Institute Of Science And Technology
-
ZHANG Zonghua
Graduate School of Information Science, Japan Advanced Institute of Science and Technology
-
Zhang Zonghua
Graduate School Of Information Science Japan Advanced Institute Of Science And Technology
関連論文
- A Nonblocking Optical Switching Network for Crosstalk-Free Permutation
- Crosstalk-Free Permutation in Photonic Rearrangeable Networks Built on a Combination of Horizontal Expansion and Vertical Stacking of Banyan Networks(Special Issue on Parallel and Distributed Computing, Applications and technologies)
- A Class of Benes-Based Optical Multistage Interconnection Networks for Crosstalk-Free Realization of Permutations(Fiber-Optic Transmission for Communications)
- Optimal Methods for Proxy Placement in Coordinated En-Route Web Caching(Internet Technology V)
- Optimal Proxy Placement for Coordinated En-Route Transcoding Proxy Caching(Internet Systems)(New Thechnologies and their Applications of the Internet)
- The Bases Associated with Trellises of a Lattice(Coding Theory)
- The Characteristic Generators for a Group Code(Coding Theory)
- Multicasting in Multihop Optical WDM Networks with Limited Wavelength Conversion(Special Invited Survey)
- Optimal parallel weighted multiselection
- Efficient weighted multiselection in parallel architectures
- Trellis Properties of Product Codes(Coding Theory)
- Some Trellis Properties on Lattices(Coding Theory)
- Constructing a Multilayered Boundary to Defend against Intrusive Anomalies(Application Information Security)