G
Gideon Creech
Researcher at University of New South Wales
Publications - 19
Citations - 1111
Gideon Creech is an academic researcher from University of New South Wales. The author has contributed to research in topics: Intrusion detection system & Anomaly detection. The author has an hindex of 11, co-authored 18 publications receiving 761 citations. Previous affiliations of Gideon Creech include Australian Defence Force Academy.
Papers
More filters
Journal ArticleDOI
A Semantic Approach to Host-Based Intrusion Detection Systems Using Contiguousand Discontiguous System Call Patterns
Gideon Creech,Jiankun Hu +1 more
TL;DR: The key concept is to apply a semantic structure to kernel level system calls in order to reflect intrinsic activities hidden in high-level programming languages, which can help understand program anomaly behaviour.
Proceedings ArticleDOI
Generation of a new IDS test dataset: Time to retire the KDD collection
Gideon Creech,Jiankun Hu +1 more
TL;DR: A new publicly available dataset is introduced which is representative of modern attack structure and methodology and is contrasted with the legacy datasets, and the performance difference of commonly used intrusion detection algorithms is highlighted.
Journal ArticleDOI
Novel Geometric Area Analysis Technique for Anomaly Detection Using Trapezoidal Area Estimation on Large-Scale Networks
TL;DR: A novel Geometric Area Analysis technique based on Trapezoidal Area Estimation (TAE) for each observation computed from the parameters of the Beta Mixture Model (BMM) for features and the distances between observations achieves a higher detection rate and lower FPR with a lower processing time than other competing methods.
Book ChapterDOI
Big Data Analytics for Intrusion Detection System: Statistical Decision-Making Using Finite Dirichlet Mixture Models
TL;DR: This chapter presents a scalable framework for building an effective and lightweight anomaly detection system using the Dirichlet mixture model and precise boundaries of interquartile range for finding small differences between legitimate and attack vectors, efficiently identifying these attacks.
Proceedings ArticleDOI
Privacy preservation intrusion detection technique for SCADA systems
TL;DR: In this paper, the authors proposed a new privacy preservation intrusion detection (PPID) technique based on the correlation coefficient and expectation maximization (EM) clustering mechanisms for selecting important portions of data and recognizing intrusive events.