Novel geometric area analysis technique for anomaly detection using trapezoidal area estimation on large-scale networks

N Moustafa, J Slay, G Creech - IEEE Transactions on Big Data, 2017 - ieeexplore.ieee.org
The prevalence of interconnected appliances and ubiquitous computing face serious threats
from the hostile activities of network attackers. Conventional Intrusion Detection Systems …

[PDF][PDF] Accelerated Local Anomaly Detection via Resolving Attributed Networks.

N Liu, X Huang, X Hu - IJCAI, 2017 - ijcai.org
Attributed networks, in which network connectivity and node attributes are available, have
been increasingly used to model real-world information systems, such as social media and e …

[HTML][HTML] Fraud detection: A systematic literature review of graph-based anomaly detection approaches

T Pourhabibi, KL Ong, BH Kam, YL Boo - Decision Support Systems, 2020 - Elsevier
Graph-based anomaly detection (GBAD) approaches are among the most popular
techniques used to analyze connectivity patterns in communication networks and identify …

Real-time big data processing for anomaly detection: A survey

RAA Habeeb, F Nasaruddin, A Gani… - International Journal of …, 2019 - Elsevier
The advent of connected devices and omnipresence of Internet have paved way for
intruders to attack networks, which leads to cyber-attack, financial loss, information theft in …

Effective and efficient network anomaly detection system using machine learning algorithm

M Nawir, A Amir, N Yaakob, OB Lynn - Bulletin of Electrical Engineering …, 2019 - beei.org
Network anomaly detection system enables to monitor computer network that behaves
differently from the network protocol and it is many implemented in various domains. Yet, the …

DAD: A Distributed Anomaly Detection system using ensemble one-class statistical learning in edge networks

N Moustafa, M Keshk, KKR Choo, T Lynar… - Future Generation …, 2021 - Elsevier
There are various data management and security tools deployed at the cloud for storing and
analyzing big data generated by the Internet of Things (IoT) and Industrial IoT (IIoT) systems …

Anomaly detection system using beta mixture models and outlier detection

N Moustafa, G Creech, J Slay - Progress in Computing, Analytics and …, 2018 - Springer
An intrusion detection system (IDS) plays a significant role in recognising suspicious
activities in hosts or networks, even though this system still has the challenge of producing …

Anomaly detection with representative neighbors

H Liu, X Xu, E Li, S Zhang, X Li - IEEE Transactions on Neural …, 2021 - ieeexplore.ieee.org
Identifying anomalies from data has attracted increasing attention in recent years due to its
broad range of potential applications. Although many efforts have been made for anomaly …

Network anomaly intrusion detection using a nonparametric Bayesian approach and feature selection

W Alhakami, A ALharbi, S Bourouis, R Alroobaea… - IEEE …, 2019 - ieeexplore.ieee.org
Anomaly-based intrusion detection systems (IDSs) have been deployed to monitor network
activity and to protect systems and the Internet of Things (IoT) devices from attacks (or …

Big data analytics for network anomaly detection from netflow data

DS Terzi, R Terzi, S Sagiroglu - 2017 International Conference …, 2017 - ieeexplore.ieee.org
Cyber-attacks was organized in a simple and random way in the past. However attacks are
carried out systematically and long term nowadays. In addition, the high calculation volume …