Survey on incremental approaches for network anomaly detection

MH Bhuyan, DK Bhattacharyya, JK Kalita - arXiv preprint arXiv:1211.4493, 2012 - arxiv.org
As the communication industry has connected distant corners of the globe using advances
in network technology, intruders or attackers have also increased attacks on networking …

An overview of anomaly detection techniques: Existing solutions and latest technological trends

A Patcha, JM Park - Computer networks, 2007 - Elsevier
As advances in networking technology help to connect the distant corners of the globe and
as the Internet continues to expand its influence as a medium for communications and …

Anomaly-based network intrusion detection: Techniques, systems and challenges

P Garcia-Teodoro, J Diaz-Verdejo… - computers & …, 2009 - Elsevier
The Internet and computer networks are exposed to an increasing number of security
threats. With new types of attacks appearing continually, developing flexible and adaptive …

Anomaly‐based intrusion detection systems: The requirements, methods, measurements, and datasets

S Hajj, R El Sibai, J Bou Abdo… - Transactions on …, 2021 - Wiley Online Library
With the Internet's unprecedented growth and nations' reliance on computer networks, new
cyber‐attacks are created every day as means for achieving financial gain, imposing …

A comprehensive survey on network anomaly detection

G Fernandes, JJPC Rodrigues, LF Carvalho… - Telecommunication …, 2019 - Springer
Nowadays, there is a huge and growing concern about security in information and
communication technology among the scientific community because any attack or anomaly …

Autonomic parameter tuning of anomaly-based IDSs: an SSH case study

A Sperotto, M Mandjes, R Sadre… - IEEE Transactions on …, 2012 - ieeexplore.ieee.org
Anomaly-based intrusion detection systems classify network traffic instances by comparing
them with a model of the normal network behavior. To be effective, such systems are …

[图书][B] Network anomaly detection: A machine learning perspective

DK Bhattacharyya, JK Kalita - 2013 - books.google.com
With the rapid rise in the ubiquity and sophistication of Internet technology and the
accompanying growth in the number of network attacks, network intrusion detection has …

Network anomaly detection: methods, systems and tools

MH Bhuyan, DK Bhattacharyya… - … surveys & tutorials, 2013 - ieeexplore.ieee.org
Network anomaly detection is an important and dynamic research area. Many network
intrusion detection methods and systems (NIDS) have been proposed in the literature. In this …

A scalable, efficient and informative approach for anomaly‐based intrusion detection systems: theory and practice

O Salem, S Vaton, A Gravey - International Journal of Network …, 2010 - Wiley Online Library
In this paper, we present the design and implementation of a new approach for anomaly
detection and classification over high speed networks. The proposed approach is based first …

Behavioral features for network anomaly detection

JP Early, CE Brodley - Machine learning and data mining for computer …, 2006 - Springer
Research in network intrusion detection has traditionally been divided into two components–
misuse detection and anomaly detection. The distinction between the two comes from the …