MV Mahoney - Proceedings of the 2003 ACM symposium on Applied …, 2003 - dl.acm.org
Hostile network traffic is often "different" from benign traffic in ways that can be distinguished without knowing the nature of the attack. We describe a two stage anomalydetection system …
T Shon, J Moon - Information Sciences, 2007 - Elsevier
… of the hybrid machine learning approach for networkanomalydetection. The enhanced SVM … We concentrate on novel attack detection in TCP/IP traffic because TCP/IP based network …
MK Hooshmand, D Hosahalli - CAAI Transactions on …, 2022 - Wiley Online Library
… To transform this performance towards the task of networkanomalydetection in cyber-… The authors' approach divides network traffic data into transmission control protocol (TCP), user …
… are two major approaches in attempt to solve the intrusion detection problem. Anomaly detection, which is the subject of this study, relies on building models from network data and …
JS Park, DH Choi, YB Jeon, Y Nam, M Hong, DS Park - Soft Computing, 2018 - Springer
… This paper proposes a new anomalydetection-based network intrusion detection strategy based on a probabilistic model. We use two anomaly symptoms (TCP throughput and CPU …
… of networkanomalies. Section 3 gives a brief explanation of network data types used as input in anomalydetection … It shows the headers of TCP/IP packets passing through the network …
… TCP/UDP port and destination TCP/UDP port. The systems were evaluated using a real network … the detection of anomalous behavior by maintaining a satisfactory false-alarm rate. …
… finds anomalies in network packets over TCP sessions. LERAD uses an Apriori-like algorithm [92] that finds conditional rules over nominal attributes in a time series, eg, a sequence of …
SD Anton, S Kanoor, D Fraunholz… - Proceedings of the 13th …, 2018 - dl.acm.org
… In this work, machine learning-based anomalydetection algorithms are employed to find malicious traffic in a synthetically generated data set of Modbus/TCP communication of a …