Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Gaurav Tandon is active.

Publication


Featured researches published by Gaurav Tandon.


knowledge discovery and data mining | 2007

Weighting versus pruning in rule validation for detecting network and host anomalies

Gaurav Tandon; Philip K. Chan

For intrusion detection, the LERAD algorithm learns a succinct set of comprehensible rules for detecting anomalies, which could be novel attacks. LERAD validates the learned rules on a separate held-out validation set and removes rules that cause false alarms. However, removing rules with possible high coverage can lead to missed detections. We propose to retain these rules and associate weights to them. We present three weighting schemes and our empirical results indicate that, for LERAD, rule weighting can detect more attacks than pruning with minimal computational overhead.


International Journal on Artificial Intelligence Tools | 2006

ON THE LEARNING OF SYSTEM CALL ATTRIBUTES FOR HOST-BASED ANOMALY DETECTION

Gaurav Tandon; Philip K. Chan

Traditional host-based anomaly detection systems model normal behavior of applications by analyzing system call sequences. The current sequence is then examined (using the model) for anomalous behavior, which could correspond to attacks. Though these techniques have been shown to be quite effective, a key element is missing – the inclusion and utilization of the system call arguments. Recent research shows that sequence-based systems are prone to evasion. We propose an idea of learning different representations for system call arguments. Results indicate that this information can be effectively used for detecting more attacks than traditional sequence-based techniques, with reasonable storage and computational overhead.


Machine Learning | 2010

Increasing coverage to improve detection of network and host anomalies

Gaurav Tandon; Philip K. Chan

For intrusion detection, the LERAD algorithm learns a succinct set of comprehensible rules for detecting anomalies, which could be novel attacks. LERAD validates the learned rules on a separate held-out validation set and removes rules that cause false alarms. However, removing rules with possible high coverage can lead to missed detections. We propose three techniques for increasing coverage—Weighting, Replacement and Hybrid. Weighting retains previously pruned rules and associate weights to them. Replacement, on the other hand, substitutes pruned rules with other candidate rules to ensure high coverage. We also present a Hybrid approach that selects between the two techniques based on training data coverage. Empirical results from seven data sets indicate that, for LERAD, increasing coverage by Weighting, Replacement and Hybrid detects more attacks than Pruning with minimal computational overhead.


industrial and engineering applications of artificial intelligence and expert systems | 2004

Motif-oriented representation of sequences for a host-based intrusion detection system

Gaurav Tandon; Debasis Mitra; Philip K. Chan

One of the difficulties of using Artificial Neural Networks (ANNs) to estimate atmospheric temperature is the large number of potential input variables available. In this study, four different feature extraction methods were used to reduce the input vector to train four networks to estimate temperature at different atmospheric levels. The four techniques used were: genetic algorithms (GA), coefficient of determination (CoD), mutual information (MI) and simple neural analysis (SNA). The results demonstrate that of the four methods used for this data set, mutual information and simple neural analysis can generate networks that have a smaller input parameter set, while still maintaining a high degree of accuracy.


the florida ai research society | 2005

Learning Useful System Call Attributes for Anomaly Detection.

Gaurav Tandon; Philip K. Chan


visualization for computer security | 2004

MORPHEUS: motif oriented representations to purge hostile events from unlabeled sequences

Gaurav Tandon; Philip K. Chan; Debasis Mitra


Archive | 2008

Machine learning for host-based anomaly detection

Philip K. Chan; Gaurav Tandon


siam international conference on data mining | 2009

Tracking User Mobility to Detect Suspicious Behavior.

Gaurav Tandon; Philip K. Chan


Archive | 2006

Data Cleaning and Enriched Representations for Anomaly Detection in System Calls

Gaurav Tandon; Philip K. Chan; Debasis Mitra


Archive | 2007

Detecting anomalies by weighted rules

Gaurav Tandon; Philip K. Chan

Collaboration


Dive into the Gaurav Tandon's collaboration.

Top Co-Authors

Avatar

Philip K. Chan

Florida Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Debasis Mitra

Florida Institute of Technology

View shared research outputs
Researchain Logo
Decentralizing Knowledge