Toward a reliable anomaly-based intrusion detection in real-world environments

EK Viegas, AO Santin, LS Oliveira - Computer Networks, 2017 - Elsevier
A popular approach for detecting network intrusion attempts is to monitor the network traffic
for anomalies. Extensive research effort has been invested in anomaly-based network …

Toward developing a systematic approach to generate benchmark datasets for intrusion detection

A Shiravi, H Shiravi, M Tavallaee, AA Ghorbani - computers & security, 2012 - Elsevier
In network intrusion detection, anomaly-based approaches in particular suffer from accurate
evaluation, comparison, and deployment which originates from the scarcity of adequate …

Data preprocessing for anomaly based network intrusion detection: A review

JJ Davis, AJ Clark - computers & security, 2011 - Elsevier
Data preprocessing is widely recognized as an important stage in anomaly detection. This
paper reviews the data preprocessing techniques used by anomaly-based network intrusion …

[HTML][HTML] A systematic literature review of methods and datasets for anomaly-based network intrusion detection

Z Yang, X Liu, T Li, D Wu, J Wang, Y Zhao, H Han - Computers & Security, 2022 - Elsevier
As network techniques rapidly evolve, attacks are becoming increasingly sophisticated and
threatening. Network intrusion detection has been widely accepted as an effective method to …

[PDF][PDF] Network intrusion detection: Half a kingdom for a good dataset

M Małowidzki, P Berezinski, M Mazur - Proceedings of NATO STO …, 2015 - academia.edu
Researchers working on anomaly-based network intrusion detection immediately face a first,
somewhat surprising problem: The lack of good, recent datasets that could be employed for …

[图书][B] Network anomaly detection: A machine learning perspective

DK Bhattacharyya, JK Kalita - 2013 - books.google.com
With the rapid rise in the ubiquity and sophistication of Internet technology and the
accompanying growth in the number of network attacks, network intrusion detection has …

Outside the closed world: On using machine learning for network intrusion detection

R Sommer, V Paxson - 2010 IEEE symposium on security and …, 2010 - ieeexplore.ieee.org
In network intrusion detection research, one popular strategy for finding attacks is monitoring
a network's activity for anomalies: deviations from profiles of normality previously learned …

[PDF][PDF] Anomaly detection analysis of intrusion data using supervised & unsupervised approach.

P Gogoi, B Borah, DK Bhattacharyya - J. Convergence Inf. Technol., 2010 - Citeseer
Anomaly based network intrusion detection (ANID) is an important problem that has been
researched within diverse research areas and various application domains. Several …

Anomaly‐based intrusion detection systems: The requirements, methods, measurements, and datasets

S Hajj, R El Sibai, J Bou Abdo… - Transactions on …, 2021 - Wiley Online Library
With the Internet's unprecedented growth and nations' reliance on computer networks, new
cyber‐attacks are created every day as means for achieving financial gain, imposing …

Toward a more practical unsupervised anomaly detection system

J Song, H Takakura, Y Okabe, K Nakao - Information Sciences, 2013 - Elsevier
During the last decade, various machine learning and data mining techniques have been
applied to Intrusion Detection Systems (IDSs) which have played an important role in …