A comparative study of anomaly detection schemes in network intrusion detection

A Lazarevic, L Ertoz, V Kumar, A Ozgur… - Proceedings of the 2003 …, 2003 - SIAM
anomaly detection schemes for identifying different network intrusions. Several existing
supervised and unsupervised anomaly detection schemes … appropriate when detecting attacks …

[PDF][PDF] A novel anomaly detection scheme based on principal component classifier

ML Shyu, SC Chen, K Sarinnapakorn… - Proceedings of the IEEE …, 2003 - neuro.bstu.by
… From the above experimental results, our proposed anomaly detection scheme based on
the principal components works effectively in identifying the attacks. The only comparable …

A dynamic anomaly detection scheme for AODV-based mobile ad hoc networks

H Nakayama, S Kurosawa, A Jamalipour… - IEEE transactions on …, 2008 - ieeexplore.ieee.org
anomaly detection method becomes imperative to thwart the malicious attacks against it. In
this paper, we propose a new anomaly detection scheme … conventional detection schemes in …

An efficient hybrid anomaly detection scheme using K-means clustering for wireless sensor networks

M Wazid, AK Das - Wireless Personal Communications, 2016 - Springer
… 3 The Proposed Hybrid Anomaly Detection Scheme In this section, we propose a new hybrid
anomaly detection scheme applied in WSNs. For detection of the hybrid anomaly, the entire …

A comprehensive study of anomaly detection schemes in IoT networks using machine learning algorithms

A Diro, N Chilamkurti, VD Nguyen, W Heyne - Sensors, 2021 - mdpi.com
… In the rest of this section, we will present the anomaly detection schemes based on (1)
machine learning algorithms; (2) federated learning; and (3) data sources and dimensions. …

A distributed sensing data anomaly detection scheme

C Yin, B Li, Z Yin - Computers & Security, 2020 - Elsevier
… in IoT, this paper proposes an anomaly detection method for sensing data streams based on
… data anomaly detection model, the improved confidence interval is used to detect whether …

Anomaly detection: A survey

V Chandola, A Banerjee, V Kumar - ACM computing surveys (CSUR), 2009 - dl.acm.org
anomaly detection, we provide a detailed discussion of the application domains where anomaly
detection … notion of an anomaly, the different aspects of the anomaly detection problem, …

LogNADS: Network anomaly detection scheme based on log semantics representation

X Liu, W Liu, X Di, J Li, B Cai, W Ren, H Yang - Future Generation …, 2021 - Elsevier
… sequential anomaly detection, this paper proposes a network anomaly detection scheme
LogNADS … Furthermore, to better detect the sequential anomalies, we utilize the sliding window …

An efficient cache-based access anomaly detection scheme

SL Min, JD Choi - ACM SIGOPS Operating Systems Review, 1991 - dl.acm.org
detection of an anomaly is of dubious value. Existing methods for on-the-fly access anomaly
detection … an efficient cachebased access anomaly detection scheme that piggybacks on the …

Principal component-based anomaly detection scheme

ML Shyu, SC Chen, K Sarinnapakorn… - Foundations and novel …, 2006 - Springer
… In this chapter, a novel anomaly detection scheme that uses a robust principal component
classifier (PCC) to handle computer network security problems is proposed. An intrusion …