Journal
APPLIED STOCHASTIC MODELS IN BUSINESS AND INDUSTRY
Volume 31, Issue 2, Pages 97-113Publisher
WILEY
DOI: 10.1002/asmb.2052
Keywords
Anomaly detection; information security; intrusion detection; signature-based methods; statistical learning
Categories
Funding
- National Science Council [NSC 99-2218-E-011-019, NSC 100-2218-E-011-010, NSC 101-2218-E-011-009, NSC 102-2219-E-019-001]
- National Science Council
- National Taiwan University
- Intel Corporation [NSC 102-2911-I-002-001, NTU 103R7501]
- Taiwan Information Security Center (TWISC)
Ask authors/readers for more resources
One of the most traditional methods for information security can be as easy as sequence matching, such as the signature-based methods for virus detection. However, it is now well accepted that the signature-based methods are no longer satisfactory solutions for many security problems. The signature is usually too rigid, resulting in detection that is hard to adjust and easy to bypass. Statistical learning approaches can complete the puzzle to form an integrated defense system. Numerous statistical learning methods have been proposed in the last couple of decades for various applications. To solve information security problems statistically, we need to carefully choose appropriate statistical learning methods and evaluation procedures so that what seems to be a meaningful and effective method in terms of the statistical analysis can also be beneficial when the method is deployed to the real world. This paper aims to give an introductory and as self-contained as possible overview for how to correctly and effectively apply statistical methods to information security problems. We also demonstrate a couple of applications of the statistical learning methods on the problems of botnet detection and account security. Copyright (c) 2014 John Wiley & Sons, Ltd.
Authors
I am an author on this paper
Click your name to claim this paper and add it to your profile.
Reviews
Recommended
No Data Available