Anomaly detection via high-dimensional data analysis on web access data.

Suen, Ho Yan. === Thesis (M.Phil.)--Chinese University of Hong Kong, 2009. === Includes bibliographical references (leaves 99-104). === Abstract also in Chinese. === Abstract --- p.i === Acknowledgement --- p.iv === Chapter 1 --- Introduction --- p.1 === Chapter 1.1 --- Motivation --- p.1 === Ch...

Full description

Bibliographic Details
Other Authors: Suen, Ho Yan.
Format: Others
Language:English
Chinese
Published: 2009
Subjects:
Online Access:http://library.cuhk.edu.hk/record=b5894067
http://repository.lib.cuhk.edu.hk/en/item/cuhk-326945
id ndltd-cuhk.edu.hk-oai-cuhk-dr-cuhk_326945
record_format oai_dc
spelling ndltd-cuhk.edu.hk-oai-cuhk-dr-cuhk_3269452019-02-19T03:31:18Z Anomaly detection via high-dimensional data analysis on web access data. Anomaly detection (Computer security) Denial of service attacks Internet searching--Mathematics Suen, Ho Yan. Thesis (M.Phil.)--Chinese University of Hong Kong, 2009. Includes bibliographical references (leaves 99-104). Abstract also in Chinese. Abstract --- p.i Acknowledgement --- p.iv Chapter 1 --- Introduction --- p.1 Chapter 1.1 --- Motivation --- p.1 Chapter 1.2 --- Organization --- p.4 Chapter 2 --- Literature Review --- p.6 Chapter 2.1 --- Related Works --- p.6 Chapter 2.2 --- Background Study --- p.7 Chapter 2.2.1 --- World Wide Web --- p.7 Chapter 2.2.2 --- Distributed Denial of Service Attack --- p.11 Chapter 2.2.3 --- Tools for Dimension Reduction --- p.13 Chapter 2.2.4 --- Tools for Anomaly Detection --- p.20 Chapter 2.2.5 --- Receiver operating characteristics (ROC) Analysis --- p.22 Chapter 3 --- System Design --- p.25 Chapter 3.1 --- Methodology --- p.25 Chapter 3.2 --- System Overview --- p.27 Chapter 3.3 --- Reference Profile Construction --- p.31 Chapter 3.4 --- Real-time Anomaly Detection and Response --- p.32 Chapter 3.5 --- Chapter Summary --- p.34 Chapter 4 --- Reference Profile Construction --- p.35 Chapter 4.1 --- Web Access Logs Collection --- p.35 Chapter 4.2 --- Data Preparation --- p.37 Chapter 4.3 --- Feature Extraction and Embedding Engine (FEE Engine) --- p.40 Chapter 4.3.1 --- Sub-Sequence Extraction --- p.42 Chapter 4.3.2 --- Hash Function on Sub-sequences (optional) --- p.45 Chapter 4.3.3 --- Feature Vector Construction --- p.46 Chapter 4.3.4 --- Diffusion Wavelets Embedding --- p.47 Chapter 4.3.5 --- Numerical Example of Feature Set Reduction --- p.49 Chapter 4.3.6 --- Reference Profile and Further Use of FEE Engine --- p.50 Chapter 4.4 --- Chapter Summary --- p.50 Chapter 5 --- Real-time Anomaly Detection and Response --- p.52 Chapter 5.1 --- Session Filtering and Data Preparation --- p.54 Chapter 5.2 --- Feature Extraction and Embedding --- p.54 Chapter 5.3 --- Distance-based Outlier Scores Calculation --- p.55 Chapter 5.4 --- Anomaly Detection and Response --- p.56 Chapter 5.4.1 --- Length-Based Anomaly Detection Modules --- p.56 Chapter 5.4.2 --- Characteristics of Anomaly Detection Modules --- p.59 Chapter 5.4.3 --- Dynamic Threshold Adaptation --- p.60 Chapter 5.5 --- Chapter Summary --- p.63 Chapter 6 --- Experimental Results --- p.65 Chapter 6.1 --- Experiment Datasets --- p.65 Chapter 6.1.1 --- Normal Web Access Logs --- p.66 Chapter 6.1.2 --- Attack Data Generation --- p.68 Chapter 6.2 --- ROC Curve Construction --- p.70 Chapter 6.3 --- System Parameters Selection --- p.71 Chapter 6.4 --- Performance of Anomaly Detection --- p.82 Chapter 6.4.1 --- Performance Analysis --- p.85 Chapter 6.4.2 --- Performance in defending DDoS attacks --- p.87 Chapter 6.5 --- Computation Requirement --- p.91 Chapter 6.6 --- Chapter Summary --- p.95 Chapter 7 --- Conclusion and Future Work --- p.96 Bibliography --- p.99 Suen, Ho Yan. Chinese University of Hong Kong Graduate School. Division of Information Engineering. 2009 Text bibliography print xiv, 104 leaves : ill. ; 30 cm. cuhk:326945 http://library.cuhk.edu.hk/record=b5894067 eng chi Use of this resource is governed by the terms and conditions of the Creative Commons “Attribution-NonCommercial-NoDerivatives 4.0 International” License (http://creativecommons.org/licenses/by-nc-nd/4.0/) http://repository.lib.cuhk.edu.hk/en/islandora/object/cuhk%3A326945/datastream/TN/view/Anomaly%20detection%20via%20high-dimensional%20data%20analysis%20on%20web%20access%20data.jpghttp://repository.lib.cuhk.edu.hk/en/item/cuhk-326945
collection NDLTD
language English
Chinese
format Others
sources NDLTD
topic Anomaly detection (Computer security)
Denial of service attacks
Internet searching--Mathematics
spellingShingle Anomaly detection (Computer security)
Denial of service attacks
Internet searching--Mathematics
Anomaly detection via high-dimensional data analysis on web access data.
description Suen, Ho Yan. === Thesis (M.Phil.)--Chinese University of Hong Kong, 2009. === Includes bibliographical references (leaves 99-104). === Abstract also in Chinese. === Abstract --- p.i === Acknowledgement --- p.iv === Chapter 1 --- Introduction --- p.1 === Chapter 1.1 --- Motivation --- p.1 === Chapter 1.2 --- Organization --- p.4 === Chapter 2 --- Literature Review --- p.6 === Chapter 2.1 --- Related Works --- p.6 === Chapter 2.2 --- Background Study --- p.7 === Chapter 2.2.1 --- World Wide Web --- p.7 === Chapter 2.2.2 --- Distributed Denial of Service Attack --- p.11 === Chapter 2.2.3 --- Tools for Dimension Reduction --- p.13 === Chapter 2.2.4 --- Tools for Anomaly Detection --- p.20 === Chapter 2.2.5 --- Receiver operating characteristics (ROC) Analysis --- p.22 === Chapter 3 --- System Design --- p.25 === Chapter 3.1 --- Methodology --- p.25 === Chapter 3.2 --- System Overview --- p.27 === Chapter 3.3 --- Reference Profile Construction --- p.31 === Chapter 3.4 --- Real-time Anomaly Detection and Response --- p.32 === Chapter 3.5 --- Chapter Summary --- p.34 === Chapter 4 --- Reference Profile Construction --- p.35 === Chapter 4.1 --- Web Access Logs Collection --- p.35 === Chapter 4.2 --- Data Preparation --- p.37 === Chapter 4.3 --- Feature Extraction and Embedding Engine (FEE Engine) --- p.40 === Chapter 4.3.1 --- Sub-Sequence Extraction --- p.42 === Chapter 4.3.2 --- Hash Function on Sub-sequences (optional) --- p.45 === Chapter 4.3.3 --- Feature Vector Construction --- p.46 === Chapter 4.3.4 --- Diffusion Wavelets Embedding --- p.47 === Chapter 4.3.5 --- Numerical Example of Feature Set Reduction --- p.49 === Chapter 4.3.6 --- Reference Profile and Further Use of FEE Engine --- p.50 === Chapter 4.4 --- Chapter Summary --- p.50 === Chapter 5 --- Real-time Anomaly Detection and Response --- p.52 === Chapter 5.1 --- Session Filtering and Data Preparation --- p.54 === Chapter 5.2 --- Feature Extraction and Embedding --- p.54 === Chapter 5.3 --- Distance-based Outlier Scores Calculation --- p.55 === Chapter 5.4 --- Anomaly Detection and Response --- p.56 === Chapter 5.4.1 --- Length-Based Anomaly Detection Modules --- p.56 === Chapter 5.4.2 --- Characteristics of Anomaly Detection Modules --- p.59 === Chapter 5.4.3 --- Dynamic Threshold Adaptation --- p.60 === Chapter 5.5 --- Chapter Summary --- p.63 === Chapter 6 --- Experimental Results --- p.65 === Chapter 6.1 --- Experiment Datasets --- p.65 === Chapter 6.1.1 --- Normal Web Access Logs --- p.66 === Chapter 6.1.2 --- Attack Data Generation --- p.68 === Chapter 6.2 --- ROC Curve Construction --- p.70 === Chapter 6.3 --- System Parameters Selection --- p.71 === Chapter 6.4 --- Performance of Anomaly Detection --- p.82 === Chapter 6.4.1 --- Performance Analysis --- p.85 === Chapter 6.4.2 --- Performance in defending DDoS attacks --- p.87 === Chapter 6.5 --- Computation Requirement --- p.91 === Chapter 6.6 --- Chapter Summary --- p.95 === Chapter 7 --- Conclusion and Future Work --- p.96 === Bibliography --- p.99
author2 Suen, Ho Yan.
author_facet Suen, Ho Yan.
title Anomaly detection via high-dimensional data analysis on web access data.
title_short Anomaly detection via high-dimensional data analysis on web access data.
title_full Anomaly detection via high-dimensional data analysis on web access data.
title_fullStr Anomaly detection via high-dimensional data analysis on web access data.
title_full_unstemmed Anomaly detection via high-dimensional data analysis on web access data.
title_sort anomaly detection via high-dimensional data analysis on web access data.
publishDate 2009
url http://library.cuhk.edu.hk/record=b5894067
http://repository.lib.cuhk.edu.hk/en/item/cuhk-326945
_version_ 1718976994230665216