Anomaly detection in IP networks

M Thottan, C Ji - IEEE Transactions on signal processing, 2003 - ieeexplore.ieee.org
network data that describes TCP operations to detect SYN1 flooding attacks. SYN flooding
attacks capitalize on the limitation that TCP … Once the queue limit is reached, future TCP

Network traffic anomaly detection based on packet bytes

MV Mahoney - Proceedings of the 2003 ACM symposium on Applied …, 2003 - dl.acm.org
Hostile network traffic is often "different" from benign traffic in ways that can be distinguished
without knowing the nature of the attack. We describe a two stage anomaly detection system …

A hybrid machine learning approach to network anomaly detection

T Shon, J Moon - Information Sciences, 2007 - Elsevier
… of the hybrid machine learning approach for network anomaly detection. The enhanced SVM
… We concentrate on novel attack detection in TCP/IP traffic because TCP/IP based network

Network anomaly detection using deep learning techniques

MK Hooshmand, D Hosahalli - CAAI Transactions on …, 2022 - Wiley Online Library
… To transform this performance towards the task of network anomaly detection in cyber-… The
authors' approach divides network traffic data into transmission control protocol (TCP), user …

Anomaly detection in TCP/IP networks using immune systems paradigm

F Seredynski, P Bouvry - Computer communications, 2007 - Elsevier
… are two major approaches in attempt to solve the intrusion detection problem. Anomaly
detection, which is the subject of this study, relies on building models from network data and …

[HTML][HTML] Network anomaly detection based on probabilistic analysis

JS Park, DH Choi, YB Jeon, Y Nam, M Hong, DS Park - Soft Computing, 2018 - Springer
… This paper proposes a new anomaly detection-based network intrusion detection strategy
based on a probabilistic model. We use two anomaly symptoms (TCP throughput and CPU …

[HTML][HTML] A comprehensive survey on network anomaly detection

G Fernandes, JJPC Rodrigues, LF Carvalho… - Telecommunication …, 2019 - Springer
… of network anomalies. Section 3 gives a brief explanation of network data types used as input
in anomaly detection … It shows the headers of TCP/IP packets passing through the network

Network anomaly detection using IP flows with principal component analysis and ant colony optimization

G Fernandes Jr, LF Carvalho, JJPC Rodrigues… - Journal of Network and …, 2016 - Elsevier
TCP/UDP port and destination TCP/UDP port. The systems were evaluated using a real
network … the detection of anomalous behavior by maintaining a satisfactory false-alarm rate. …

Network anomaly detection: methods, systems and tools

MH Bhuyan, DK Bhattacharyya… - … surveys & tutorials, 2013 - ieeexplore.ieee.org
… finds anomalies in network packets over TCP sessions. LERAD uses an Apriori-like algorithm
[92] that finds conditional rules over nominal attributes in a time series, eg, a sequence of …

Evaluation of machine learning-based anomaly detection algorithms on an industrial modbus/tcp data set

SD Anton, S Kanoor, D Fraunholz… - Proceedings of the 13th …, 2018 - dl.acm.org
… In this work, machine learning-based anomaly detection algorithms are employed to find
malicious traffic in a synthetically generated data set of Modbus/TCP communication of a …