Network anomaly detection: methods, systems and tools

MH Bhuyan, DK Bhattacharyya… - … surveys & tutorials, 2013 - ieeexplore.ieee.org
Network anomaly detection is an important and dynamic research area. Many network
intrusion detection methods and systems (NIDS) have been proposed in the literature. In this …

An overview of anomaly detection techniques: Existing solutions and latest technological trends

A Patcha, JM Park - Computer networks, 2007 - Elsevier
As advances in networking technology help to connect the distant corners of the globe and
as the Internet continues to expand its influence as a medium for communications and …

An intrusion-detection model

DE Denning - IEEE Transactions on software engineering, 1987 - ieeexplore.ieee.org
A model of a real-time intrusion-detection expert system capable of detecting break-ins,
penetrations, and other forms of computer abuse is described. The model is based on the …

Anomaly-based network intrusion detection: Techniques, systems and challenges

P Garcia-Teodoro, J Diaz-Verdejo… - computers & …, 2009 - Elsevier
The Internet and computer networks are exposed to an increasing number of security
threats. With new types of attacks appearing continually, developing flexible and adaptive …

A real-time and ubiquitous network attack detection based on deep belief network and support vector machine

H Zhang, Y Li, Z Lv, AK Sangaiah… - IEEE/CAA Journal of …, 2020 - ieeexplore.ieee.org
In recent years, network traffic data have become larger and more complex, leading to
higher possibilities of network intrusion. Traditional intrusion detection methods face …

Towards a taxonomy of intrusion-detection systems

H Debar, M Dacier, A Wespi - Computer networks, 1999 - Elsevier
Intrusion-detection systems aim at detecting attacks against computer systems and
networks, or against information systems in general, as it is difficult to provide provably …

The base-rate fallacy and the difficulty of intrusion detection

S Axelsson - ACM Transactions on Information and System Security …, 2000 - dl.acm.org
Many different demands can be made of intrusion detection systems. An important
requirement is that an intrusion detection system be effective; that is, it should detect a …

State transition analysis: A rule-based intrusion detection approach

K Ilgun, RA Kemmerer, PA Porras - IEEE transactions on …, 1995 - ieeexplore.ieee.org
The paper presents a new approach to representing and detecting computer penetrations in
real time. The approach, called state transition analysis, models penetrations as a series of …

[图书][B] Network anomaly detection: A machine learning perspective

DK Bhattacharyya, JK Kalita - 2013 - books.google.com
With the rapid rise in the ubiquity and sophistication of Internet technology and the
accompanying growth in the number of network attacks, network intrusion detection has …

[PDF][PDF] EMERALD: Event monitoring enabling response to anomalous live disturbances

PA Porras, PG Neumann - Proceedings of the 20th national information …, 1997 - csrc.nist.gov
The EMERALD (Event Monitori ng Enabli ng Responses to Anomal ous Li ve Di sturbances)
envi ronment isa di stri buted scal abl e tool sui te for tracki ng mal i ci ous acti vi tythrough …