Statistical approaches for secure and clean internet안전한 클린 인터넷을 위한 통계적 접근 방법

Cited 0 time in webofscience Cited 0 time in scopus
  • Hit : 627
  • Download : 0
In recent years, there has been an increasing need for preventing security issues such as malicious attacks on computers, the leakage of personal information, and the spread of harmful contents through the Internet. In this thesis, statistical approaches are proposed to practically address these issues. The approaches include: (i) an unsupervised data mining technique for online anomaly detection; (ii) a supervised data mining technique for clean Internet; and (iii) a statistical approach for efficient and secure database. First, this study focuses on online anomaly detection for network security. Here, a novel framework is developed for fully unsupervised training and online anomaly detection. The framework is designed so that an initial model is constructed and then it gradually evolves according to the current state of online data without any human intervention. In the framework, a self-organizing map (SOM) that is seamlessly combined with K-means clustering is transformed into an adaptive and dynamic algorithm suitable for real-time processing. The network structure of the SOM is appropriately adapted to incoming data and then dynamically clustered by using the K-means algorithm. In addition, clusters are automatically reconstructed or split up based on runtime accumulative measures. The performance of the proposed approach is evaluated through experiments using the well-known KDD Cup 1999 data set and further experiments using the honeypot data recently collected from Kyoto University. It is shown that the proposed approach can significantly increase the detection rate while the false alarm rate remains low. In particular, it is capable of detecting new types of attacks at the earliest possible time. Second, a hierarchical filtering system is proposed to detect an objectionable video. It consists of three phases using multiple features in different temporal domains. In the first phase, early detection is performed based on hash signatures prior to the ...
Advisors
Kim, Se-Hunresearcher김세헌researcher
Description
한국과학기술원 : 산업및시스템공학과,
Publisher
한국과학기술원
Issue Date
2010
Identifier
455345/325007  / 020075131
Language
eng
Description

학위논문(박사) - 한국과학기술원 : 산업및시스템공학과, 2010.08, [ viii, 113 p. ]

Keywords

인터넷보안; 데이터마이닝; 순서유지암호; 클린인터넷; 침입탐지; Intrusion Detection; Internet Security; Data Mining; Clean Internet; Order Preserving Encryption

URI
http://hdl.handle.net/10203/40665
Link
http://library.kaist.ac.kr/search/detail/view.do?bibCtrlNo=455345&flag=dissertation
Appears in Collection
IE-Theses_Ph.D.(박사논문)
Files in This Item
There are no files associated with this item.

qr_code

  • mendeley

    citeulike


rss_1.0 rss_2.0 atom_1.0