A3 Book section, Chapters in research books
Learning Temporal Regularities of User Behavior for Anomaly Detection (2001)


Seleznyov, A., Mazhelis, O., & Puuronen, S. (2001). Learning Temporal Regularities of User Behavior for Anomaly Detection. In V. Gorodetski, L. Popyak, & V. Skormin (Eds.), Information Assurance in Computer Networks : Methods, Models and Architectures for Network Security (pp. 143-152). Springer. Lecture Notes in Computer Science, 2052. https://doi.org/10.1007/3-540-45116-1_16


JYU authors or editors


Publication details

All authors or editorsSeleznyov, Alexandr; Mazhelis, Oleksiy; Puuronen, Seppo

Parent publicationInformation Assurance in Computer Networks : Methods, Models and Architectures for Network Security

Parent publication editorsGorodetski, V.; Popyak, L.; Skormin, V.

ISBN978-3-540-42103-0

eISBN978-3-540-45116-7

Journal or seriesLecture Notes in Computer Science

ISSN0302-9743

Publication year2001

Number in series2052

Pages range143-152

PublisherSpringer

Place of PublicationBerlin

Publication countryGermany

Publication languageEnglish

DOIhttps://doi.org/10.1007/3-540-45116-1_16

Publication open accessNot open

Publication channel open access


Abstract

Fast expansion of inexpensive computers and computer networks has dramatically increased number of computer security incidents during last years. While quite many computer systems are still vulnerable to numerous attacks, intrusion detection has become vitally important as a response to constantly increasing number of threats. In this paper we discuss an approach to discover temporal and sequential regularities in user behavior. We present an algorithm that allows creating and maintaining user profiles relying not only on sequential information but taking into account temporal features, such as events’ lengths and possible temporal relations between them. The constructed profiles represent peculiarities of users’ behavior and used to decide whether a behavior of a certain user is normal or abnormal.


Free keywordsnetwork security; intrusion detection; anomaly detection; online learning; user profiling; user recognition


Contributing organizations


Ministry reportingYes

Preliminary JUFO ratingNot rated


Last updated on 2023-14-12 at 16:26