4.2 Article

Statistical learning methods for information security: fundamentals and case studies

Journal

Publisher

WILEY
DOI: 10.1002/asmb.2052

Keywords

Anomaly detection; information security; intrusion detection; signature-based methods; statistical learning

Funding

  1. National Science Council [NSC 99-2218-E-011-019, NSC 100-2218-E-011-010, NSC 101-2218-E-011-009, NSC 102-2219-E-019-001]
  2. National Science Council
  3. National Taiwan University
  4. Intel Corporation [NSC 102-2911-I-002-001, NTU 103R7501]
  5. Taiwan Information Security Center (TWISC)

Ask authors/readers for more resources

One of the most traditional methods for information security can be as easy as sequence matching, such as the signature-based methods for virus detection. However, it is now well accepted that the signature-based methods are no longer satisfactory solutions for many security problems. The signature is usually too rigid, resulting in detection that is hard to adjust and easy to bypass. Statistical learning approaches can complete the puzzle to form an integrated defense system. Numerous statistical learning methods have been proposed in the last couple of decades for various applications. To solve information security problems statistically, we need to carefully choose appropriate statistical learning methods and evaluation procedures so that what seems to be a meaningful and effective method in terms of the statistical analysis can also be beneficial when the method is deployed to the real world. This paper aims to give an introductory and as self-contained as possible overview for how to correctly and effectively apply statistical methods to information security problems. We also demonstrate a couple of applications of the statistical learning methods on the problems of botnet detection and account security. Copyright (c) 2014 John Wiley & Sons, Ltd.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.2
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available