scispace - formally typeset
Journal ArticleDOI

A survey of network anomaly detection techniques

TLDR
This paper presents an in-depth analysis of four major categories of anomaly detection techniques which include classification, statistical, information theory and clustering and evaluates effectiveness of different categories of techniques.
About
This article is published in Journal of Network and Computer Applications.The article was published on 2016-01-01. It has received 992 citations till now. The article focuses on the topics: Intrusion detection system & Anomaly detection.

read more

Citations
More filters
Book ChapterDOI

GANomaly : semi-supervised anomaly detection via adversarial training.

TL;DR: In this paper, a conditional generative adversarial network (GAN) is used for anomaly detection in a one-class, semi-supervised learning paradigm, where an encoder-decoder-encoder sub-network is employed to map the input image to a lower dimension vector, which is then used to reconstruct the generated output image.
Journal ArticleDOI

Survey of intrusion detection systems: techniques, datasets and challenges

TL;DR: A taxonomy of contemporary IDS is presented, a comprehensive review of notable recent works, and an overview of the datasets commonly used for evaluation purposes are presented, and evasion techniques used by attackers to avoid detection are presented.
Journal ArticleDOI

Network Intrusion Detection for IoT Security Based on Learning Techniques

TL;DR: This survey classifies the IoT security threats and challenges for IoT networks by evaluating existing defense techniques and provides a comprehensive review of NIDSs deploying different aspects of learning techniques for IoT, unlike other top surveys targeting the traditional systems.
Journal ArticleDOI

A Detailed Investigation and Analysis of Using Machine Learning Techniques for Intrusion Detection

TL;DR: A detailed investigation and analysis of various machine learning techniques have been carried out for finding the cause of problems associated with variousMachine learning techniques in detecting intrusive activities and future directions are provided for attack detection using machinelearning techniques.
Journal ArticleDOI

A Unifying Review of Deep and Shallow Anomaly Detection

TL;DR: This review aims to identify the common underlying principles and the assumptions that are often made implicitly by various methods in deep learning, and draws connections between classic “shallow” and novel deep approaches and shows how this relation might cross-fertilize or extend both directions.
References
More filters
Proceedings Article

A density-based algorithm for discovering clusters a density-based algorithm for discovering clusters in large spatial databases with noise

TL;DR: In this paper, a density-based notion of clusters is proposed to discover clusters of arbitrary shape, which can be used for class identification in large spatial databases and is shown to be more efficient than the well-known algorithm CLAR-ANS.
Proceedings Article

A density-based algorithm for discovering clusters in large spatial Databases with Noise

TL;DR: DBSCAN, a new clustering algorithm relying on a density-based notion of clusters which is designed to discover clusters of arbitrary shape, is presented which requires only one input parameter and supports the user in determining an appropriate value for it.
Journal ArticleDOI

Data clustering: a review

TL;DR: An overview of pattern clustering methods from a statistical pattern recognition perspective is presented, with a goal of providing useful advice and references to fundamental concepts accessible to the broad community of clustering practitioners.
Book

An Introduction to Support Vector Machines and Other Kernel-based Learning Methods

TL;DR: This is the first comprehensive introduction to Support Vector Machines (SVMs), a new generation learning system based on recent advances in statistical learning theory, and will guide practitioners to updated literature, new applications, and on-line software.
Journal ArticleDOI

Anomaly detection: A survey

TL;DR: This survey tries to provide a structured and comprehensive overview of the research on anomaly detection by grouping existing techniques into different categories based on the underlying approach adopted by each technique.
Related Papers (5)