Anomaly-based network intrusion detection: Techniques, systems and challenges
Citations
1,704 citations
Additional excerpts
...[4] focus on anomaly-based network intrusion techniques....
[...]
1,102 citations
Cites background from "Anomaly-based network intrusion det..."
...High-speed networks and fast-propagating threats pose challenges to current IDSs, which detect break-in attempts by carefully monitoring per packet in the heavy network traffic....
[...]
1,070 citations
Cites background from "Anomaly-based network intrusion det..."
...Other domains include intrusion detection for cybersecurity (Garcia-Teodoro et al., 2009), fraud detection (Phua et al....
[...]
...Other domains include intrusion detection for cybersecurity (Garcia-Teodoro et al., 2009), fraud detection (Phua et al., 2005), and medical diagnosis (Salem et al., 2013; Schlegl et al., 2017)....
[...]
971 citations
Cites background from "Anomaly-based network intrusion det..."
...1: A proximity measure S is a function X × X → R that has the following properties [47]....
[...]
771 citations
Cites methods from "Anomaly-based network intrusion det..."
...These systems (using anomaly- (Garcia-Teodoro et al. 2009) or rule-based detection methods), extract and analyze (either locally or by a remote server) a set of features indicating the state of the device at runtime....
[...]
References
5,248 citations
4,081 citations
3,860 citations
3,369 citations