Optimizing network anomaly detection scheme using instance selection mechanism

Y Li, TB Lu, L Guo, ZH Tian, L Qi - GLOBECOM 2009-2009 …, 2009 - ieeexplore.ieee.org
Network anomaly detection is a classically difficult research topic in intrusion detection.
However, existing research has been solely focused on the detection algorithm. An …

Network anomaly detection based on TCM-KNN algorithm

Y Li, B Fang, L Guo, Y Chen - Proceedings of the 2nd ACM symposium …, 2007 - dl.acm.org
Intrusion detection is a critical component of secure information systems. Network anomaly
detection has been an active and difficult research topic in the field of Intrusion Detection for …

An efficient network anomaly detection scheme based on TCM-KNN algorithm and data reduction mechanism

Y Li, L Guo - 2007 IEEE SMC Information Assurance and …, 2007 - ieeexplore.ieee.org
Network anomaly detection plays a vital role in securing network security and infrastructures.
Current research focuses concentrate on how to effective reduce high false alarm rate and …

TCM-KNN scheme for network anomaly detection using feature-based optimizations

Y Li, L Guo - Proceedings of the 2008 ACM symposium on applied …, 2008 - dl.acm.org
With the rapid increase of network threats and cyber attacks, network security problem is
becoming more and more serious. Network anomaly detection is a key technique to secure …

[PDF][PDF] A Novel Network Anomaly Detection Method based on Data Balancing and Recursive Feature Addition.

X Liu, J Ren, H He, Q Wang, S Sun - KSII Transactions on Internet & …, 2020 - itiis.org
Network anomaly detection system plays an essential role in detecting network anomaly and
ensuring network security. Anomaly detection system based machine learning has become …

Network Intrusion Anomaly Detection Model Based on Multiclassifier Fusion Technology

F Hang, W Guo, H Chen, L Xie, X Bai… - Mobile Information …, 2023 - Wiley Online Library
With the increasing development of the industrial Internet, network security has attracted
more and more attention. Among the numerous network security technologies, anomaly …

[PDF][PDF] An effective TCM-KNN scheme for high-speed network anomaly detection

Y Li - International Journal of Advanced Science and …, 2010 - Citeseer
Network anomaly detection has been a hot topic in the past years. However, high false
alarm rate, difficulties in obtaining exact clean data for the modeling of normal patterns and …

Network anomaly detection using a fuzzy rule-based classifier

S Ghosh, A Pal, A Nag, S Sadhu… - … and Electrical Technology, 2017 - taylorfrancis.com
Network anomaly detection is one of the important approaches in the field of Internet security
to detect threat to network resources. In this work, we address the problems related to …

CH-SVM based network anomaly detection

XQ Zhang, CH Gu - 2007 International Conference on Machine …, 2007 - ieeexplore.ieee.org
Network anomaly detection is a critical task to ensure network security. With increasing
network traffic, detecting network anomaly would require solving a large-scale pattern …

Online and scalable unsupervised network anomaly detection method

J Dromard, G Roudiere… - IEEE Transactions on …, 2016 - ieeexplore.ieee.org
Nowadays, network intrusion detectors mainly rely on knowledge databases to detect
suspicious traffic. These databases have to be continuously updated which requires …