Machine learning for anomaly detection: A systematic review

AB Nassif, MA Talib, Q Nasir, FM Dakalbab - Ieee Access, 2021 - ieeexplore.ieee.org
Anomaly detection has been used for decades to identify and extract anomalous
components from data. Many techniques have been used to detect anomalies. One of the …

Outlier detection for temporal data: A survey

M Gupta, J Gao, CC Aggarwal… - IEEE Transactions on …, 2013 - ieeexplore.ieee.org
In the statistics community, outlier detection for time series data has been studied for
decades. Recently, with advances in hardware and software technology, there has been a …

On the security of containers: Threat modeling, attack analysis, and mitigation strategies

AY Wong, EG Chekole, M Ochoa, J Zhou - Computers & Security, 2023 - Elsevier
Traditionally, applications that are used in large and small enterprises were deployed on
“bare metal” servers installed with operating systems. Recently, the use of multiple virtual …

An anomaly detection system based on variable N-gram features and one-class SVM

W Khreich, B Khosravifar, A Hamou-Lhadj… - Information and Software …, 2017 - Elsevier
Context: Run-time detection of system anomalies at the host level remains a challenging
task. Existing techniques suffer from high rates of false alarms, hindering large-scale …

[HTML][HTML] A critical analysis of the industrial device scanners' potentials, risks, and preventives

M Borhani, GS Gaba, J Basaez, I Avgouleas… - Journal of Industrial …, 2024 - Elsevier
Industrial device scanners allow anyone to scan devices on private networks and the
Internet. They were intended as network security tools, but they are commonly exploited as …

A nature-inspired approach to speed up optimum-path forest clustering and its application to intrusion detection in computer networks

KAP Costa, LAM Pereira, RYM Nakamura… - Information …, 2015 - Elsevier
We propose a nature-inspired approach to estimate the probability density function (pdf)
used for data clustering based on the optimum-path forest algorithm (OPFC). OPFC …

Intrusion detection using continuous time Bayesian networks

J Xu, CR Shelton - Journal of Artificial Intelligence Research, 2010 - jair.org
Intrusion detection systems (IDSs) fall into two high-level categories: network-based systems
(NIDS) that monitor network behaviors, and host-based systems (HIDS) that monitor system …

Threat modeling and security analysis of containers: A survey

AY Wong, EG Chekole, M Ochoa, J Zhou - arXiv preprint arXiv:2111.11475, 2021 - arxiv.org
Traditionally, applications that are used in large and small enterprises were deployed on"
bare metal" servers installed with operating systems. Recently, the use of multiple virtual …

Surveillance of anomaly and misuse in critical networks to counter insider threats using computational intelligence

DS Punithavathani, K Sujatha, JM Jain - Cluster Computing, 2015 - Springer
The Insider threat is minimally addressed by current information security practices, yet the
insider poses the most serious threat to organization through various malicious activities …

Sequential anomaly detection based on temporal-difference learning: Principles, models and case studies

X Xu - Applied Soft Computing, 2010 - Elsevier
Anomaly detection is an important problem that has been popularly researched within
diverse research areas and application domains. One of the open problems in anomaly …