Machine learning for anomaly detection: A systematic review
Anomaly detection has been used for decades to identify and extract anomalous
components from data. Many techniques have been used to detect anomalies. One of the …
components from data. Many techniques have been used to detect anomalies. One of the …
Outlier detection for temporal data: A survey
In the statistics community, outlier detection for time series data has been studied for
decades. Recently, with advances in hardware and software technology, there has been a …
decades. Recently, with advances in hardware and software technology, there has been a …
On the security of containers: Threat modeling, attack analysis, and mitigation strategies
Traditionally, applications that are used in large and small enterprises were deployed on
“bare metal” servers installed with operating systems. Recently, the use of multiple virtual …
“bare metal” servers installed with operating systems. Recently, the use of multiple virtual …
An anomaly detection system based on variable N-gram features and one-class SVM
W Khreich, B Khosravifar, A Hamou-Lhadj… - Information and Software …, 2017 - Elsevier
Context: Run-time detection of system anomalies at the host level remains a challenging
task. Existing techniques suffer from high rates of false alarms, hindering large-scale …
task. Existing techniques suffer from high rates of false alarms, hindering large-scale …
[HTML][HTML] A critical analysis of the industrial device scanners' potentials, risks, and preventives
Industrial device scanners allow anyone to scan devices on private networks and the
Internet. They were intended as network security tools, but they are commonly exploited as …
Internet. They were intended as network security tools, but they are commonly exploited as …
A nature-inspired approach to speed up optimum-path forest clustering and its application to intrusion detection in computer networks
We propose a nature-inspired approach to estimate the probability density function (pdf)
used for data clustering based on the optimum-path forest algorithm (OPFC). OPFC …
used for data clustering based on the optimum-path forest algorithm (OPFC). OPFC …
Intrusion detection using continuous time Bayesian networks
J Xu, CR Shelton - Journal of Artificial Intelligence Research, 2010 - jair.org
Intrusion detection systems (IDSs) fall into two high-level categories: network-based systems
(NIDS) that monitor network behaviors, and host-based systems (HIDS) that monitor system …
(NIDS) that monitor network behaviors, and host-based systems (HIDS) that monitor system …
Threat modeling and security analysis of containers: A survey
Traditionally, applications that are used in large and small enterprises were deployed on"
bare metal" servers installed with operating systems. Recently, the use of multiple virtual …
bare metal" servers installed with operating systems. Recently, the use of multiple virtual …
Surveillance of anomaly and misuse in critical networks to counter insider threats using computational intelligence
DS Punithavathani, K Sujatha, JM Jain - Cluster Computing, 2015 - Springer
The Insider threat is minimally addressed by current information security practices, yet the
insider poses the most serious threat to organization through various malicious activities …
insider poses the most serious threat to organization through various malicious activities …
Sequential anomaly detection based on temporal-difference learning: Principles, models and case studies
X Xu - Applied Soft Computing, 2010 - Elsevier
Anomaly detection is an important problem that has been popularly researched within
diverse research areas and application domains. One of the open problems in anomaly …
diverse research areas and application domains. One of the open problems in anomaly …