Data preprocessing for anomaly based network intrusion detection: A review

JJ Davis, AJ Clark - computers & security, 2011 - Elsevier
Data preprocessing is widely recognized as an important stage in anomaly detection. This
paper reviews the data preprocessing techniques used by anomaly-based network intrusion …

HEDGE: efficient traffic classification of encrypted and compressed packets

F Casino, KKR Choo, C Patsakis - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
As the size and source of network traffic increase, so does the challenge of monitoring and
analyzing network traffic. Therefore, sampling algorithms are often used to alleviate these …

[PDF][PDF] Big data analytics for network intrusion detection: A survey

L Wang, R Jones - International Journal of Networks and …, 2017 - academia.edu
Analysing network flows, logs, and system events has been used for intrusion detection.
Network flows, logs, and system events, etc. generate big data. Big Data analytics can …

Methods, systems, and computer readable media for rapid filtering of opaque data traffic

AM White, F Monrose, S Krishnan, PA Porras… - US Patent …, 2018 - Google Patents
Methods, systems, and computer readable media for rapid filtering of opaque data traffic are
disclosed. According to one method, the method includes receiving a packet containing a …

Sceadan: Using concatenated n-gram vectors for improved file and data type classification

NL Beebe, LA Maddox, L Liu… - IEEE Transactions on …, 2013 - ieeexplore.ieee.org
Over 20 studies have been published in the past decade involving file and data type
classification for digital forensics and information security applications. Methods using n …

[HTML][HTML] A comparative study of support vector machine and neural networks for file type identification using n-gram analysis

J Sester, D Hayes, M Scanlon, NA Le-Khac - Forensic Science International …, 2021 - Elsevier
File type identification (FTI) has become a major discipline for anti-virus developers, firewall
designers and for forensic cybercrime investigators. Over the past few years, research has …

Intrusion detection using MDL compression

EE Eiland, SC Evans, TS Markham… - US Patent 8,375,446, 2013 - Google Patents
This application is a continuation of US patent applica tion Ser. No. 12/260,627, filed Oct. 29,
2008, the entire dis closure of which is hereby incorporated by reference. Embodiments of …

A new approach to content-based file type detection

MC Amirani, M Toorani… - 2008 IEEE Symposium on …, 2008 - ieeexplore.ieee.org
File type identification and file type clustering may be difficult tasks that have an increasingly
importance in the field of computer and network security. Classical methods of file type …

Cyber intrusion prediction and taxonomy system using deep learning and distributed big data processing

H Al Najada, I Mahgoub… - 2018 IEEE symposium …, 2018 - ieeexplore.ieee.org
The issue of cybersecurity is becoming more and more serious every day at all levels and in
all domains. Cyber-attacks threaten the national security of every country and nation …

Feature‐based type identification of file fragments

MC Amirani, M Toorani… - Security and …, 2013 - Wiley Online Library
Digital information is packed into files when it is going to be stored on storage media. Each
computer file is associated with a type. Type detection of computer data is a building block in …