A survey of network anomaly detection techniques
M Ahmed, AN Mahmood, J Hu - Journal of Network and Computer …, 2016 - Elsevier
Abstract Information and Communication Technology (ICT) has a great impact on social
wellbeing, economic growth and national security in todays world. Generally, ICT includes …
wellbeing, economic growth and national security in todays world. Generally, ICT includes …
Network anomaly detection: methods, systems and tools
MH Bhuyan, DK Bhattacharyya… - … surveys & tutorials, 2013 - ieeexplore.ieee.org
Network anomaly detection is an important and dynamic research area. Many network
intrusion detection methods and systems (NIDS) have been proposed in the literature. In this …
intrusion detection methods and systems (NIDS) have been proposed in the literature. In this …
Deep learning approaches for anomaly-based intrusion detection systems: A survey, taxonomy, and open issues
A Aldweesh, A Derhab, AZ Emam - Knowledge-Based Systems, 2020 - Elsevier
The massive growth of data that are transmitted through a variety of devices and
communication protocols have raised serious security concerns, which have increased the …
communication protocols have raised serious security concerns, which have increased the …
Intrusion detection system: A comprehensive review
HJ Liao, CHR Lin, YC Lin, KY Tung - Journal of Network and Computer …, 2013 - Elsevier
With the increasing amount of network throughput and security threat, the study of intrusion
detection systems (IDSs) has received a lot of attention throughout the computer science …
detection systems (IDSs) has received a lot of attention throughout the computer science …
Survey on misbehavior detection in cooperative intelligent transportation systems
RW Van Der Heijden, S Dietzel… - … Surveys & Tutorials, 2018 - ieeexplore.ieee.org
Cooperative intelligent transportation systems (cITS) are a promising technology to enhance
driving safety and efficiency. Vehicles communicate wirelessly with other vehicles and …
driving safety and efficiency. Vehicles communicate wirelessly with other vehicles and …
[PDF][PDF] Machine learning techniques for anomaly detection: an overview
Intrusion detection has gain a broad attention and become a fertile field for several
researches, and still being the subject of widespread interest by researchers. The intrusion …
researches, and still being the subject of widespread interest by researchers. The intrusion …
An entropy-based network anomaly detection method
Data mining is an interdisciplinary subfield of computer science involving methods at the
intersection of artificial intelligence, machine learning and statistics. One of the data mining …
intersection of artificial intelligence, machine learning and statistics. One of the data mining …
Anomaly-based network intrusion detection: Techniques, systems and challenges
P Garcia-Teodoro, J Diaz-Verdejo… - computers & …, 2009 - Elsevier
The Internet and computer networks are exposed to an increasing number of security
threats. With new types of attacks appearing continually, developing flexible and adaptive …
threats. With new types of attacks appearing continually, developing flexible and adaptive …
An intrusion detection and prevention system in cloud computing: A systematic review
The distributed and open structure of cloud computing and services becomes an attractive
target for potential cyber-attacks by intruders. The traditional Intrusion Detection and …
target for potential cyber-attacks by intruders. The traditional Intrusion Detection and …
An overview of anomaly detection techniques: Existing solutions and latest technological trends
As advances in networking technology help to connect the distant corners of the globe and
as the Internet continues to expand its influence as a medium for communications and …
as the Internet continues to expand its influence as a medium for communications and …