D Chou, M Jiang - ACM Computing Surveys (CSUR), 2021 - dl.acm.org
Data-driven network intrusion detection (NID) has a tendency towards minority attack classes compared to normal traffic. Many datasets are collected in simulated environments …
A Gepperth, B Hammer - European symposium on artificial neural …, 2016 - hal.science
Incremental learning refers to learning from streaming data, which arrive over time, with limited memory resources and, ideally, without sacrificing model accuracy. This setting fits …
A Singh - US Patent 10,050,998, 2018 - Google Patents
A computerized technique is provided to analyze a message for malware by determining context information from attributes of the message. The attributes are determined by …
M Odiathevar, WKG Seah, M Frean… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Network data constantly evolves with new network applications and protocols. There is a need for robust techniques to detect anomalous behaviour. Offline models trained with static …
D Chou, M Jiang - arXiv preprint arXiv:2009.07352, 2020 - arxiv.org
Data-driven methods have been widely used in network intrusion detection (NID) systems. However, there are currently a number of challenges derived from how the datasets are …
Traffic anomalies arise from network problems, and so detection and diagnosis are useful tools for network managers. A great deal of progress has been made on this problem so far …
A Singh - US Patent 10,581,898, 2020 - Google Patents
(57) ABSTRACT A computerized technique is provided to analyze a message for malware by determining context information from attri butes of the message. The attributes are …
M Odiathevar, WKG Seah… - 2019 28th International …, 2019 - ieeexplore.ieee.org
With the advancement in technology, normal network traffic is becoming more heterogeneous. In this scenario, the problem of detecting anomalies is intensified. In the …
X Fan, C Li, X Dong - Journal of Visualization, 2019 - Springer
The real-time analysis of network data is of great significance to network security. Visualization technology and machine learning can assist in network data analysis from …