Anomaly detection: A survey

V Chandola, A Banerjee, V Kumar - ACM computing surveys (CSUR), 2009 - dl.acm.org
Anomaly detection is an important problem that has been researched within diverse
research areas and application domains. Many anomaly detection techniques have been …

[PDF][PDF] Outlier detection: applications and techniques

K Singh, S Upadhyaya - International Journal of Computer Science Issues …, 2012 - Citeseer
Outliers once upon a time regarded as noisy data in statistics, has turned out to be an
important problem which is being researched in diverse fields of research and application …

Outlier detection for temporal data: A survey

M Gupta, J Gao, CC Aggarwal… - IEEE Transactions on …, 2013 - ieeexplore.ieee.org
In the statistics community, outlier detection for time series data has been studied for
decades. Recently, with advances in hardware and software technology, there has been a …

Outlier detection for multidimensional time series using deep neural networks

T Kieu, B Yang, CS Jensen - 2018 19th IEEE international …, 2018 - ieeexplore.ieee.org
Due to the continued digitization of industrial and societal processes, including the
deployment of networked sensors, we are witnessing a rapid proliferation of time-ordered …

Anomaly detection for discrete sequences: A survey

V Chandola, A Banerjee… - IEEE transactions on …, 2010 - ieeexplore.ieee.org
This survey attempts to provide a comprehensive and structured overview of the existing
research for the problem of detecting anomalies in discrete/symbolic sequences. The …

[PDF][PDF] Outlier detection: A survey

V Chandola, A Banerjee, V Kumar - ACM Computing Surveys, 2007 - researchgate.net
Outlier detection has been a very important concept in the realm of data analysis. Recently,
several application domains have realized the direct mapping between outliers in data and …

ADMIT: anomaly-based data mining for intrusions

K Sequeira, M Zaki - Proceedings of the eighth ACM SIGKDD …, 2002 - dl.acm.org
Security of computer systems is essential to their acceptance and utility. Computer security
analysts use intrusion detection systems to assist them in maintaining computer system …

User profiling in intrusion detection: A review

J Peng, KKR Choo, H Ashman - Journal of Network and Computer …, 2016 - Elsevier
Intrusion detection systems are important for detecting and reacting to the presence of
unauthorised users of a network or system. They observe the actions of the system and its …

Detecting intrusions through system call sequence and argument analysis

F Maggi, M Matteucci, S Zanero - IEEE Transactions on …, 2008 - ieeexplore.ieee.org
We describe an unsupervised host-based intrusion detection system based on system call
arguments and sequences. We define a set of anomaly detection models for the individual …

Log correlation for intrusion detection: A proof of concept

C Abad, J Taylor, C Sengul, W Yurcik… - 19th Annual …, 2003 - ieeexplore.ieee.org
Intrusion detection is an important part of networked-systems security protection. Although
commercial products exist, finding intrusions has proven to be a difficult task with limitations …