Anomaly detection via high-dimensional data analysis on web access data.
Suen, Ho Yan. === Thesis (M.Phil.)--Chinese University of Hong Kong, 2009. === Includes bibliographical references (leaves 99-104). === Abstract also in Chinese. === Abstract --- p.i === Acknowledgement --- p.iv === Chapter 1 --- Introduction --- p.1 === Chapter 1.1 --- Motivation --- p.1 === Ch...
Other Authors: | |
---|---|
Format: | Others |
Language: | English Chinese |
Published: |
2009
|
Subjects: | |
Online Access: | http://library.cuhk.edu.hk/record=b5894067 http://repository.lib.cuhk.edu.hk/en/item/cuhk-326945 |
id |
ndltd-cuhk.edu.hk-oai-cuhk-dr-cuhk_326945 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-cuhk.edu.hk-oai-cuhk-dr-cuhk_3269452019-02-19T03:31:18Z Anomaly detection via high-dimensional data analysis on web access data. Anomaly detection (Computer security) Denial of service attacks Internet searching--Mathematics Suen, Ho Yan. Thesis (M.Phil.)--Chinese University of Hong Kong, 2009. Includes bibliographical references (leaves 99-104). Abstract also in Chinese. Abstract --- p.i Acknowledgement --- p.iv Chapter 1 --- Introduction --- p.1 Chapter 1.1 --- Motivation --- p.1 Chapter 1.2 --- Organization --- p.4 Chapter 2 --- Literature Review --- p.6 Chapter 2.1 --- Related Works --- p.6 Chapter 2.2 --- Background Study --- p.7 Chapter 2.2.1 --- World Wide Web --- p.7 Chapter 2.2.2 --- Distributed Denial of Service Attack --- p.11 Chapter 2.2.3 --- Tools for Dimension Reduction --- p.13 Chapter 2.2.4 --- Tools for Anomaly Detection --- p.20 Chapter 2.2.5 --- Receiver operating characteristics (ROC) Analysis --- p.22 Chapter 3 --- System Design --- p.25 Chapter 3.1 --- Methodology --- p.25 Chapter 3.2 --- System Overview --- p.27 Chapter 3.3 --- Reference Profile Construction --- p.31 Chapter 3.4 --- Real-time Anomaly Detection and Response --- p.32 Chapter 3.5 --- Chapter Summary --- p.34 Chapter 4 --- Reference Profile Construction --- p.35 Chapter 4.1 --- Web Access Logs Collection --- p.35 Chapter 4.2 --- Data Preparation --- p.37 Chapter 4.3 --- Feature Extraction and Embedding Engine (FEE Engine) --- p.40 Chapter 4.3.1 --- Sub-Sequence Extraction --- p.42 Chapter 4.3.2 --- Hash Function on Sub-sequences (optional) --- p.45 Chapter 4.3.3 --- Feature Vector Construction --- p.46 Chapter 4.3.4 --- Diffusion Wavelets Embedding --- p.47 Chapter 4.3.5 --- Numerical Example of Feature Set Reduction --- p.49 Chapter 4.3.6 --- Reference Profile and Further Use of FEE Engine --- p.50 Chapter 4.4 --- Chapter Summary --- p.50 Chapter 5 --- Real-time Anomaly Detection and Response --- p.52 Chapter 5.1 --- Session Filtering and Data Preparation --- p.54 Chapter 5.2 --- Feature Extraction and Embedding --- p.54 Chapter 5.3 --- Distance-based Outlier Scores Calculation --- p.55 Chapter 5.4 --- Anomaly Detection and Response --- p.56 Chapter 5.4.1 --- Length-Based Anomaly Detection Modules --- p.56 Chapter 5.4.2 --- Characteristics of Anomaly Detection Modules --- p.59 Chapter 5.4.3 --- Dynamic Threshold Adaptation --- p.60 Chapter 5.5 --- Chapter Summary --- p.63 Chapter 6 --- Experimental Results --- p.65 Chapter 6.1 --- Experiment Datasets --- p.65 Chapter 6.1.1 --- Normal Web Access Logs --- p.66 Chapter 6.1.2 --- Attack Data Generation --- p.68 Chapter 6.2 --- ROC Curve Construction --- p.70 Chapter 6.3 --- System Parameters Selection --- p.71 Chapter 6.4 --- Performance of Anomaly Detection --- p.82 Chapter 6.4.1 --- Performance Analysis --- p.85 Chapter 6.4.2 --- Performance in defending DDoS attacks --- p.87 Chapter 6.5 --- Computation Requirement --- p.91 Chapter 6.6 --- Chapter Summary --- p.95 Chapter 7 --- Conclusion and Future Work --- p.96 Bibliography --- p.99 Suen, Ho Yan. Chinese University of Hong Kong Graduate School. Division of Information Engineering. 2009 Text bibliography print xiv, 104 leaves : ill. ; 30 cm. cuhk:326945 http://library.cuhk.edu.hk/record=b5894067 eng chi Use of this resource is governed by the terms and conditions of the Creative Commons “Attribution-NonCommercial-NoDerivatives 4.0 International” License (http://creativecommons.org/licenses/by-nc-nd/4.0/) http://repository.lib.cuhk.edu.hk/en/islandora/object/cuhk%3A326945/datastream/TN/view/Anomaly%20detection%20via%20high-dimensional%20data%20analysis%20on%20web%20access%20data.jpghttp://repository.lib.cuhk.edu.hk/en/item/cuhk-326945 |
collection |
NDLTD |
language |
English Chinese |
format |
Others
|
sources |
NDLTD |
topic |
Anomaly detection (Computer security) Denial of service attacks Internet searching--Mathematics |
spellingShingle |
Anomaly detection (Computer security) Denial of service attacks Internet searching--Mathematics Anomaly detection via high-dimensional data analysis on web access data. |
description |
Suen, Ho Yan. === Thesis (M.Phil.)--Chinese University of Hong Kong, 2009. === Includes bibliographical references (leaves 99-104). === Abstract also in Chinese. === Abstract --- p.i === Acknowledgement --- p.iv === Chapter 1 --- Introduction --- p.1 === Chapter 1.1 --- Motivation --- p.1 === Chapter 1.2 --- Organization --- p.4 === Chapter 2 --- Literature Review --- p.6 === Chapter 2.1 --- Related Works --- p.6 === Chapter 2.2 --- Background Study --- p.7 === Chapter 2.2.1 --- World Wide Web --- p.7 === Chapter 2.2.2 --- Distributed Denial of Service Attack --- p.11 === Chapter 2.2.3 --- Tools for Dimension Reduction --- p.13 === Chapter 2.2.4 --- Tools for Anomaly Detection --- p.20 === Chapter 2.2.5 --- Receiver operating characteristics (ROC) Analysis --- p.22 === Chapter 3 --- System Design --- p.25 === Chapter 3.1 --- Methodology --- p.25 === Chapter 3.2 --- System Overview --- p.27 === Chapter 3.3 --- Reference Profile Construction --- p.31 === Chapter 3.4 --- Real-time Anomaly Detection and Response --- p.32 === Chapter 3.5 --- Chapter Summary --- p.34 === Chapter 4 --- Reference Profile Construction --- p.35 === Chapter 4.1 --- Web Access Logs Collection --- p.35 === Chapter 4.2 --- Data Preparation --- p.37 === Chapter 4.3 --- Feature Extraction and Embedding Engine (FEE Engine) --- p.40 === Chapter 4.3.1 --- Sub-Sequence Extraction --- p.42 === Chapter 4.3.2 --- Hash Function on Sub-sequences (optional) --- p.45 === Chapter 4.3.3 --- Feature Vector Construction --- p.46 === Chapter 4.3.4 --- Diffusion Wavelets Embedding --- p.47 === Chapter 4.3.5 --- Numerical Example of Feature Set Reduction --- p.49 === Chapter 4.3.6 --- Reference Profile and Further Use of FEE Engine --- p.50 === Chapter 4.4 --- Chapter Summary --- p.50 === Chapter 5 --- Real-time Anomaly Detection and Response --- p.52 === Chapter 5.1 --- Session Filtering and Data Preparation --- p.54 === Chapter 5.2 --- Feature Extraction and Embedding --- p.54 === Chapter 5.3 --- Distance-based Outlier Scores Calculation --- p.55 === Chapter 5.4 --- Anomaly Detection and Response --- p.56 === Chapter 5.4.1 --- Length-Based Anomaly Detection Modules --- p.56 === Chapter 5.4.2 --- Characteristics of Anomaly Detection Modules --- p.59 === Chapter 5.4.3 --- Dynamic Threshold Adaptation --- p.60 === Chapter 5.5 --- Chapter Summary --- p.63 === Chapter 6 --- Experimental Results --- p.65 === Chapter 6.1 --- Experiment Datasets --- p.65 === Chapter 6.1.1 --- Normal Web Access Logs --- p.66 === Chapter 6.1.2 --- Attack Data Generation --- p.68 === Chapter 6.2 --- ROC Curve Construction --- p.70 === Chapter 6.3 --- System Parameters Selection --- p.71 === Chapter 6.4 --- Performance of Anomaly Detection --- p.82 === Chapter 6.4.1 --- Performance Analysis --- p.85 === Chapter 6.4.2 --- Performance in defending DDoS attacks --- p.87 === Chapter 6.5 --- Computation Requirement --- p.91 === Chapter 6.6 --- Chapter Summary --- p.95 === Chapter 7 --- Conclusion and Future Work --- p.96 === Bibliography --- p.99 |
author2 |
Suen, Ho Yan. |
author_facet |
Suen, Ho Yan. |
title |
Anomaly detection via high-dimensional data analysis on web access data. |
title_short |
Anomaly detection via high-dimensional data analysis on web access data. |
title_full |
Anomaly detection via high-dimensional data analysis on web access data. |
title_fullStr |
Anomaly detection via high-dimensional data analysis on web access data. |
title_full_unstemmed |
Anomaly detection via high-dimensional data analysis on web access data. |
title_sort |
anomaly detection via high-dimensional data analysis on web access data. |
publishDate |
2009 |
url |
http://library.cuhk.edu.hk/record=b5894067 http://repository.lib.cuhk.edu.hk/en/item/cuhk-326945 |
_version_ |
1718976994230665216 |