scispace - formally typeset
G

Gideon Creech

Researcher at University of New South Wales

Publications -  19
Citations -  1111

Gideon Creech is an academic researcher from University of New South Wales. The author has contributed to research in topics: Intrusion detection system & Anomaly detection. The author has an hindex of 11, co-authored 18 publications receiving 761 citations. Previous affiliations of Gideon Creech include Australian Defence Force Academy.

Papers
More filters
Journal ArticleDOI

A Semantic Approach to Host-Based Intrusion Detection Systems Using Contiguousand Discontiguous System Call Patterns

TL;DR: The key concept is to apply a semantic structure to kernel level system calls in order to reflect intrinsic activities hidden in high-level programming languages, which can help understand program anomaly behaviour.
Proceedings ArticleDOI

Generation of a new IDS test dataset: Time to retire the KDD collection

TL;DR: A new publicly available dataset is introduced which is representative of modern attack structure and methodology and is contrasted with the legacy datasets, and the performance difference of commonly used intrusion detection algorithms is highlighted.
Journal ArticleDOI

Novel Geometric Area Analysis Technique for Anomaly Detection Using Trapezoidal Area Estimation on Large-Scale Networks

TL;DR: A novel Geometric Area Analysis technique based on Trapezoidal Area Estimation (TAE) for each observation computed from the parameters of the Beta Mixture Model (BMM) for features and the distances between observations achieves a higher detection rate and lower FPR with a lower processing time than other competing methods.
Book ChapterDOI

Big Data Analytics for Intrusion Detection System: Statistical Decision-Making Using Finite Dirichlet Mixture Models

TL;DR: This chapter presents a scalable framework for building an effective and lightweight anomaly detection system using the Dirichlet mixture model and precise boundaries of interquartile range for finding small differences between legitimate and attack vectors, efficiently identifying these attacks.
Proceedings ArticleDOI

Privacy preservation intrusion detection technique for SCADA systems

TL;DR: In this paper, the authors proposed a new privacy preservation intrusion detection (PPID) technique based on the correlation coefficient and expectation maximization (EM) clustering mechanisms for selecting important portions of data and recognizing intrusive events.