Network anomaly detection: methods, systems and tools

MH Bhuyan, DK Bhattacharyya… - … surveys & tutorials, 2013 - ieeexplore.ieee.org
Network anomaly detection is an important and dynamic research area. Many network
intrusion detection methods and systems (NIDS) have been proposed in the literature. In this …

Anomaly detection: A survey

V Chandola, A Banerjee, V Kumar - ACM computing surveys (CSUR), 2009 - dl.acm.org
Anomaly detection is an important problem that has been researched within diverse
research areas and application domains. Many anomaly detection techniques have been …

Anomaly-based intrusion detection system through feature selection analysis and building hybrid efficient model

S Aljawarneh, M Aldwairi, MB Yassein - Journal of Computational Science, 2018 - Elsevier
Efficiently detecting network intrusions requires the gathering of sensitive information. This
means that one has to collect large amounts of network transactions including high details of …

Accelerated deep neural networks for enhanced intrusion detection system

S Potluri, C Diedrich - 2016 IEEE 21st international conference …, 2016 - ieeexplore.ieee.org
Network based communication is more vulnerable to outsider and insider attacks in recent
days due to its wide spread applications in many fields. Intrusion Detection System (IDS) a …

[图书][B] Network anomaly detection: A machine learning perspective

DK Bhattacharyya, JK Kalita - 2013 - books.google.com
With the rapid rise in the ubiquity and sophistication of Internet technology and the
accompanying growth in the number of network attacks, network intrusion detection has …

[PDF][PDF] Outlier detection: A survey

V Chandola, A Banerjee, V Kumar - ACM Computing Surveys, 2007 - researchgate.net
Outlier detection has been a very important concept in the realm of data analysis. Recently,
several application domains have realized the direct mapping between outliers in data and …

Clustering intrusion detection alarms to support root cause analysis

K Julisch - ACM transactions on information and system security …, 2003 - dl.acm.org
It is a well-known problem that intrusion detection systems overload their human operators
by triggering thousands of alarms per day. This paper presents a new approach for handling …

Specification-based anomaly detection: a new approach for detecting network intrusions

R Sekar, A Gupta, J Frullo, T Shanbhag… - Proceedings of the 9th …, 2002 - dl.acm.org
Unlike signature or misuse based intrusion detection techniques, anomaly detection is
capable of detecting novel attacks. However, the use of anomaly detection in practice is …

[PDF][PDF] Application of deep learning-based intrusion detection system (IDS) in network anomaly traffic detection

F Zhao, H Li, K Niu, J Shi, R Song - Appl. Comput. Eng, 2024 - preprints.org
This study discusses the application of deep learning technology in network intrusion
detection systems (IDS) and focuses on a new model named CNN-Focal. First, through the …

STATL: An attack language for state-based intrusion detection

ST Eckmann, G Vigna… - Journal of computer …, 2002 - content.iospress.com
STATL is an extensible state/transition-based attack description language designed to
support intrusion detection. The language allows one to describe computer penetrations as …