A survey of network anomaly detection techniques

M Ahmed, AN Mahmood, J Hu - Journal of Network and Computer …, 2016 - Elsevier
Abstract Information and Communication Technology (ICT) has a great impact on social
wellbeing, economic growth and national security in todays world. Generally, ICT includes …

Network anomaly detection: methods, systems and tools

MH Bhuyan, DK Bhattacharyya… - … surveys & tutorials, 2013 - ieeexplore.ieee.org
Network anomaly detection is an important and dynamic research area. Many network
intrusion detection methods and systems (NIDS) have been proposed in the literature. In this …

Deep learning approaches for anomaly-based intrusion detection systems: A survey, taxonomy, and open issues

A Aldweesh, A Derhab, AZ Emam - Knowledge-Based Systems, 2020 - Elsevier
The massive growth of data that are transmitted through a variety of devices and
communication protocols have raised serious security concerns, which have increased the …

Intrusion detection system: A comprehensive review

HJ Liao, CHR Lin, YC Lin, KY Tung - Journal of Network and Computer …, 2013 - Elsevier
With the increasing amount of network throughput and security threat, the study of intrusion
detection systems (IDSs) has received a lot of attention throughout the computer science …

Survey on misbehavior detection in cooperative intelligent transportation systems

RW Van Der Heijden, S Dietzel… - … Surveys & Tutorials, 2018 - ieeexplore.ieee.org
Cooperative intelligent transportation systems (cITS) are a promising technology to enhance
driving safety and efficiency. Vehicles communicate wirelessly with other vehicles and …

[PDF][PDF] Machine learning techniques for anomaly detection: an overview

S Omar, A Ngadi, HH Jebur - International Journal of Computer …, 2013 - Citeseer
Intrusion detection has gain a broad attention and become a fertile field for several
researches, and still being the subject of widespread interest by researchers. The intrusion …

An entropy-based network anomaly detection method

P Bereziński, B Jasiul, M Szpyrka - Entropy, 2015 - mdpi.com
Data mining is an interdisciplinary subfield of computer science involving methods at the
intersection of artificial intelligence, machine learning and statistics. One of the data mining …

Anomaly-based network intrusion detection: Techniques, systems and challenges

P Garcia-Teodoro, J Diaz-Verdejo… - computers & …, 2009 - Elsevier
The Internet and computer networks are exposed to an increasing number of security
threats. With new types of attacks appearing continually, developing flexible and adaptive …

An intrusion detection and prevention system in cloud computing: A systematic review

A Patel, M Taghavi, K Bakhtiyari, JC Júnior - Journal of network and …, 2013 - Elsevier
The distributed and open structure of cloud computing and services becomes an attractive
target for potential cyber-attacks by intruders. The traditional Intrusion Detection and …

An overview of anomaly detection techniques: Existing solutions and latest technological trends

A Patcha, JM Park - Computer networks, 2007 - Elsevier
As advances in networking technology help to connect the distant corners of the globe and
as the Internet continues to expand its influence as a medium for communications and …