[HTML][HTML] A systematic literature review of methods and datasets for anomaly-based network intrusion detection

Z Yang, X Liu, T Li, D Wu, J Wang, Y Zhao, H Han - Computers & Security, 2022 - Elsevier
As network techniques rapidly evolve, attacks are becoming increasingly sophisticated and
threatening. Network intrusion detection has been widely accepted as an effective method to …

Anomaly-based network intrusion detection: Techniques, systems and challenges

P Garcia-Teodoro, J Diaz-Verdejo… - computers & …, 2009 - Elsevier
The Internet and computer networks are exposed to an increasing number of security
threats. With new types of attacks appearing continually, developing flexible and adaptive …

Toward credible evaluation of anomaly-based intrusion-detection methods

M Tavallaee, N Stakhanova… - IEEE Transactions on …, 2010 - ieeexplore.ieee.org
Since the first introduction of anomaly-based intrusion detection to the research community
in 1987, the field has grown tremendously. A variety of methods and techniques introducing …

A taxonomy of network threats and the effect of current datasets on intrusion detection systems

H Hindy, D Brosset, E Bayne, AK Seeam… - IEEE …, 2020 - ieeexplore.ieee.org
As the world moves towards being increasingly dependent on computers and automation,
building secure applications, systems and networks are some of the main challenges faced …

Anomaly‐based intrusion detection systems: The requirements, methods, measurements, and datasets

S Hajj, R El Sibai, J Bou Abdo… - Transactions on …, 2021 - Wiley Online Library
With the Internet's unprecedented growth and nations' reliance on computer networks, new
cyber‐attacks are created every day as means for achieving financial gain, imposing …

Toward developing a systematic approach to generate benchmark datasets for intrusion detection

A Shiravi, H Shiravi, M Tavallaee, AA Ghorbani - computers & security, 2012 - Elsevier
In network intrusion detection, anomaly-based approaches in particular suffer from accurate
evaluation, comparison, and deployment which originates from the scarcity of adequate …

Toward a reliable anomaly-based intrusion detection in real-world environments

EK Viegas, AO Santin, LS Oliveira - Computer Networks, 2017 - Elsevier
A popular approach for detecting network intrusion attempts is to monitor the network traffic
for anomalies. Extensive research effort has been invested in anomaly-based network …

[PDF][PDF] Anomaly detection analysis of intrusion data using supervised & unsupervised approach.

P Gogoi, B Borah, DK Bhattacharyya - J. Convergence Inf. Technol., 2010 - Citeseer
Anomaly based network intrusion detection (ANID) is an important problem that has been
researched within diverse research areas and various application domains. Several …

Deep learning approaches for anomaly-based intrusion detection systems: A survey, taxonomy, and open issues

A Aldweesh, A Derhab, AZ Emam - Knowledge-Based Systems, 2020 - Elsevier
The massive growth of data that are transmitted through a variety of devices and
communication protocols have raised serious security concerns, which have increased the …

Network anomaly detection: methods, systems and tools

MH Bhuyan, DK Bhattacharyya… - … surveys & tutorials, 2013 - ieeexplore.ieee.org
Network anomaly detection is an important and dynamic research area. Many network
intrusion detection methods and systems (NIDS) have been proposed in the literature. In this …