Network anomaly detection with incomplete audit data

A Patcha, JM Park - Computer Networks, 2007 - Elsevier
With the ever increasing deployment and usage of gigabit networks, traditional network
anomaly detection based Intrusion Detection Systems (IDS) have not scaled accordingly …

Survey on incremental approaches for network anomaly detection

MH Bhuyan, DK Bhattacharyya, JK Kalita - arXiv preprint arXiv:1211.4493, 2012 - arxiv.org
As the communication industry has connected distant corners of the globe using advances
in network technology, intruders or attackers have also increased attacks on networking …

Flow-based statistical aggregation schemes for network anomaly detection

S Song, L Ling, CN Manikopoulo - 2006 IEEE International …, 2006 - ieeexplore.ieee.org
In this paper, we present a novel Flow-based Statistical Aggregation Schemes (FSAS) for
Network Anomaly Detection. An IP flow is a unidirectional series of IP packets of a given …

A scalable, efficient and informative approach for anomaly‐based intrusion detection systems: theory and practice

O Salem, S Vaton, A Gravey - International Journal of Network …, 2010 - Wiley Online Library
In this paper, we present the design and implementation of a new approach for anomaly
detection and classification over high speed networks. The proposed approach is based first …

Unada: Unsupervised network anomaly detection using sub-space outliers ranking

P Casas, J Mazel, P Owezarski - … 2011: 10th International IFIP TC 6 …, 2011 - Springer
Current network monitoring systems rely strongly on signa-ture-based and supervised-
learning-based detection methods to hunt out network attacks and anomalies. Despite being …

Combining network anomaly detectors

M Grill - 2016 - search.proquest.com
The anomaly-based network intrusion detection systems (IDS) typically suffer from high false
alarm rate rendering them useless in practice as the subsequent analysis done by the …

Online adaptive anomaly detection for augmented network flows

D Ippoliti, C Jiang, Z Ding, X Zhou - ACM Transactions on Autonomous …, 2016 - dl.acm.org
Traditional network anomaly detection involves developing models that rely on packet
inspection. However, increasing network speeds and use of encrypted protocols make per …

Accurate anomaly detection through parallelism

S Shanbhag, T Wolf - IEEE network, 2009 - ieeexplore.ieee.org
In this article we discuss the design and implementation of a real-time parallel anomaly
detection system. The key idea is to use multiple existing anomaly detection algorithms in …

Optimizing network anomaly detection scheme using instance selection mechanism

Y Li, TB Lu, L Guo, ZH Tian, L Qi - GLOBECOM 2009-2009 …, 2009 - ieeexplore.ieee.org
Network anomaly detection is a classically difficult research topic in intrusion detection.
However, existing research has been solely focused on the detection algorithm. An …

A distributed and reliable platform for adaptive anomaly detection in ip networks

LL Ho, CJ Macey, R Hiller - International Workshop on Distributed Systems …, 1999 - Springer
Algorithms for anomaly detection in IP networks have been developed and a real-time
distributed platform for anomaly detection has been implemented. These algorithms …