Machine learning for anomaly detection: A systematic review
Anomaly detection has been used for decades to identify and extract anomalous
components from data. Many techniques have been used to detect anomalies. One of the …
components from data. Many techniques have been used to detect anomalies. One of the …
From intrusion detection to attacker attribution: A comprehensive survey of unsupervised methods
Over the last five years there has been an increase in the frequency and diversity of network
attacks. This holds true, as more and more organizations admit compromises on a daily …
attacks. This holds true, as more and more organizations admit compromises on a daily …
Firefly algorithm based feature selection for network intrusion detection
B Selvakumar, K Muneeswaran - Computers & Security, 2019 - Elsevier
Network intrusion detection is the process of identifying malicious activity in a network by
analyzing the network traffic behavior. Data mining techniques are widely used in Intrusion …
analyzing the network traffic behavior. Data mining techniques are widely used in Intrusion …
Big data analytics framework for peer-to-peer botnet detection using random forests
Network traffic monitoring and analysis-related research has struggled to scale for massive
amounts of data in real time. Some of the vertical scaling solutions provide good …
amounts of data in real time. Some of the vertical scaling solutions provide good …
Feature selection and ensemble-based intrusion detection system: an efficient and comprehensive approach
E Jaw, X Wang - Symmetry, 2021 - mdpi.com
The emergence of ground-breaking technologies such as artificial intelligence, cloud
computing, big data powered by the Internet, and its highly valued real-world applications …
computing, big data powered by the Internet, and its highly valued real-world applications …
A survey of distance and similarity measures used within network intrusion anomaly detection
DJ Weller-Fahy, BJ Borghetti… - … Surveys & Tutorials, 2014 - ieeexplore.ieee.org
Anomaly detection (AD) use within the network intrusion detection field of research, or
network intrusion AD (NIAD), is dependent on the proper use of similarity and distance …
network intrusion AD (NIAD), is dependent on the proper use of similarity and distance …
Adversarial attacks against intrusion detection systems: Taxonomy, solutions and open issues
Intrusion Detection Systems (IDSs) are one of the key components for securing computing
infrastructures. Their objective is to protect against attempts to violate defense mechanisms …
infrastructures. Their objective is to protect against attempts to violate defense mechanisms …
En-ABC: An ensemble artificial bee colony based anomaly detection scheme for cloud environment
With an exponential increase in the usage of different types of services and applications in
cloud computing environment, the identification of malicious behavior of different nodes …
cloud computing environment, the identification of malicious behavior of different nodes …
[PDF][PDF] Towards Generating Real-life Datasets for Network Intrusion Detection.
With exponential growth in the number of computer applications and the sizes of networks,
the potential damage that can be caused by attacks launched over the Internet keeps …
the potential damage that can be caused by attacks launched over the Internet keeps …
Ensemble based collaborative and distributed intrusion detection systems: A survey
G Folino, P Sabatino - Journal of Network and Computer Applications, 2016 - Elsevier
Modern network intrusion detection systems must be able to handle large and fast changing
data, often also taking into account real-time requirements. Ensemble-based data mining …
data, often also taking into account real-time requirements. Ensemble-based data mining …