scispace - formally typeset
Journal ArticleDOI

Anomaly-based network intrusion detection: Techniques, systems and challenges

Reads0
Chats0
TLDR
The main challenges to be dealt with for the wide scale deployment of anomaly-based intrusion detectors, with special emphasis on assessment issues are outlined.
About
This article is published in Computers & Security.The article was published on 2009-02-01. It has received 1712 citations till now. The article focuses on the topics: Anomaly-based intrusion detection system & Intrusion detection system.

read more

Citations
More filters
Journal ArticleDOI

Fast flow volume estimation

TL;DR: In this article, the authors present constant time algorithms for volume estimation in streams and sliding windows, which are faster than previous work and achieve an empirical 2.4-7X speedup.
Journal ArticleDOI

Early detection of network element outages based on customer trouble calls

TL;DR: The analysis showed that the timing of customers' trouble reports and their content have information potential that can be utilized for early detection of outages and a hybrid model of detection adapted to the specific environment was proposed.
Journal ArticleDOI

Intrusion Detection System with Wavelet and Neural Artifical Network Approach for Networks Computers

TL;DR: A proposal for an IDS based on the wavelet and artificial neural network that is applied to the well know Knowledge Discovery and Data Mining KDD shows high detection rate, suggesting that the approach is very promising.
Book ChapterDOI

Feature Grouping for Intrusion Detection System Based on Hierarchical Clustering

TL;DR: A new feature grouping method is proposed to select features for intrusion detection based on agglomerative hierarchical clustering method and is tested against KDD CUP 99 dataset, showing that better classification performance can be attained from such selected features.
Journal ArticleDOI

Detecting disturbances in supply chains: the case of capacity constraints

TL;DR: The signature for detecting a capacity constrained echelon was found to be based on cluster profiles of shipping and net inventory variables for that echelan as well as other echelons in a supply chain, where the variables are represented as spectra.
References
More filters
Journal ArticleDOI

LOF: identifying density-based local outliers

TL;DR: This paper contends that for many scenarios, it is more meaningful to assign to each object a degree of being an outlier, called the local outlier factor (LOF), and gives a detailed formal analysis showing that LOF enjoys many desirable properties.
Book ChapterDOI

Fast effective rule induction

TL;DR: This paper evaluates the recently-proposed rule learning algorithm IREP on a large and diverse collection of benchmark problems, and proposes a number of modifications resulting in an algorithm RIPPERk that is very competitive with C4.5 and C 4.5rules with respect to error rates, but much more efficient on large samples.
Book

Outliers in Statistical Data

Vic Barnett, +1 more
TL;DR: In this article, the authors present an updated version of the reference work on outliers, including new areas of study such as outliers in direction data as well as developments in fields such as discordancy tests for univariate and multivariate samples.
Journal ArticleDOI

An Intrusion-Detection Model

TL;DR: A model of a real-time intrusion-detection expert system capable of detecting break-ins, penetrations, and other forms of computer abuse is described, based on the hypothesis that security violations can be detected by monitoring a system's audit records for abnormal patterns of system usage.
Related Papers (5)