A comprehensive survey on network anomaly detection

G Fernandes, JJPC Rodrigues, LF Carvalho… - Telecommunication …, 2019 - Springer
Nowadays, there is a huge and growing concern about security in information and
communication technology among the scientific community because any attack or anomaly …

Anomaly detection methods for categorical data: A review

A Taha, AS Hadi - ACM Computing Surveys (CSUR), 2019 - dl.acm.org
Anomaly detection has numerous applications in diverse fields. For example, it has been
widely used for discovering network intrusions and malicious events. It has also been used …

[HTML][HTML] Analysis framework of network security situational awareness and comparison of implementation methods

Y Li, G Huang, C Wang, Y Li - EURASIP Journal on Wireless …, 2019 - Springer
Abstract Information technology has penetrated into all aspects of politics, economy, and
culture of the whole society. The information revolution has changed the way of …

A graph-based machine learning approach for bot detection

A Abou Daya, MA Salahuddin… - 2019 IFIP/IEEE …, 2019 - ieeexplore.ieee.org
Bot detection using machine learning (ML), with network flow-level features, has been
extensively studied in the literature. However, existing flow-based approaches typically incur …

A multi-objective evolutionary fuzzy system to obtain a broad and accurate set of solutions in intrusion detection systems

S Elhag, A Fernández, A Altalhi, S Alshomrani… - Soft computing, 2019 - Springer
Intrusion detection systems are devoted to monitor a network with aims at finding and
avoiding anomalous events. In particular, we focus on misuse detection systems, which are …

Distributed denial of service attacks: a threat or challenge

J Kaur Chahal, A Bhandari, S Behal - New Review of Information …, 2019 - Taylor & Francis
In today's cyber world, the Internet has become a vital resource for providing a plethora of
services. Unavailability of these services due to any reason leads to huge financial …

[PDF][PDF] Increasing accuracy and completeness of intrusion detection model using fusion of normalization, feature selection method and support vector machine

B Setiawan, S Djanali, T Ahmad, I Nopember - Int. J. Intell. Eng. Syst, 2019 - academia.edu
Detecting intrusion in network traffic has remained a problem for years. Development in the
field of machine learning provides an opportunity for researchers to detect network intrusion …

Intelligent feature engineering for cybersecurity

P Maxwell, E Alhajjar… - 2019 IEEE International …, 2019 - ieeexplore.ieee.org
Feature engineering and selection is a critical step in the implementation of any machine
learning system. In application areas such as intrusion detection for cybersecurity, this task …

Anomaly detection using agglomerative hierarchical clustering algorithm

FA Mazarbhuiya, MY AlZahrani, L Georgieva - Information Science and …, 2019 - Springer
Intrusion detection is becoming a hot topic of research for the information security people.
There are mainly two classes of intrusion detection techniques namely anomaly detection …

[PDF][PDF] An adaptive distributed intrusion detection system architecture using multi agents

AM Riyad, MSI Ahmed, RLR Khan - International Journal of Electrical …, 2019 - academia.edu
Intrusion detection systems are used for monitoring the network data, analyze them and find
the intrusions if any. The major issues with these systems are the time taken for analysis …