A survey on data-driven network intrusion detection
Data-driven network intrusion detection (NID) has a tendency towards minority attack
classes compared to normal traffic. Many datasets are collected in simulated environments …
classes compared to normal traffic. Many datasets are collected in simulated environments …
A survey of network anomaly detection techniques
M Ahmed, AN Mahmood, J Hu - Journal of Network and Computer …, 2016 - Elsevier
Abstract Information and Communication Technology (ICT) has a great impact on social
wellbeing, economic growth and national security in todays world. Generally, ICT includes …
wellbeing, economic growth and national security in todays world. Generally, ICT includes …
A comprehensive survey on network anomaly detection
Nowadays, there is a huge and growing concern about security in information and
communication technology among the scientific community because any attack or anomaly …
communication technology among the scientific community because any attack or anomaly …
A two-layer dimension reduction and two-tier classification model for anomaly-based intrusion detection in IoT backbone networks
With increasing reliance on Internet of Things (IoT) devices and services, the capability to
detect intrusions and malicious activities within IoT networks is critical for resilience of the …
detect intrusions and malicious activities within IoT networks is critical for resilience of the …
A review of novelty detection
Novelty detection is the task of classifying test data that differ in some respect from the data
that are available during training. This may be seen as “one-class classification”, in which a …
that are available during training. This may be seen as “one-class classification”, in which a …
[图书][B] An introduction to outlier analysis
CC Aggarwal, CC Aggarwal - 2017 - Springer
Outliers are also referred to as abnormalities, discordants, deviants, or anomalies in the data
mining and statistics literature. In most applications, the data is created by one or more …
mining and statistics literature. In most applications, the data is created by one or more …
Network anomaly detection: methods, systems and tools
MH Bhuyan, DK Bhattacharyya… - … surveys & tutorials, 2013 - ieeexplore.ieee.org
Network anomaly detection is an important and dynamic research area. Many network
intrusion detection methods and systems (NIDS) have been proposed in the literature. In this …
intrusion detection methods and systems (NIDS) have been proposed in the literature. In this …
A survey of AI-based anomaly detection in IoT and sensor networks
Machine learning (ML) and deep learning (DL), in particular, are common tools for anomaly
detection (AD). With the rapid increase in the number of Internet-connected devices, the …
detection (AD). With the rapid increase in the number of Internet-connected devices, the …
Botnet in DDoS attacks: trends and challenges
N Hoque, DK Bhattacharyya… - … Surveys & Tutorials, 2015 - ieeexplore.ieee.org
Threats of distributed denial of service (DDoS) attacks have been increasing day-by-day due
to rapid development of computer networks and associated infrastructure, and millions of …
to rapid development of computer networks and associated infrastructure, and millions of …
Anomaly detection: A survey
Anomaly detection is an important problem that has been researched within diverse
research areas and application domains. Many anomaly detection techniques have been …
research areas and application domains. Many anomaly detection techniques have been …