scispace - formally typeset
Journal ArticleDOI

Anomaly-based network intrusion detection: Techniques, systems and challenges

Reads0
Chats0
TLDR
The main challenges to be dealt with for the wide scale deployment of anomaly-based intrusion detectors, with special emphasis on assessment issues are outlined.
About
This article is published in Computers & Security.The article was published on 2009-02-01. It has received 1712 citations till now. The article focuses on the topics: Anomaly-based intrusion detection system & Intrusion detection system.

read more

Citations
More filters
Journal ArticleDOI

Some Clustering-Based Methodology Applications to Anomaly Intrusion Detection Systems

TL;DR: The present paper introduces some clustering-based methodology applications to the anomaly and host-based intrusion detection, which include fuzzy clustering, fuzzy clustered by local approximation of memberships and 2-means clustering algorithms.
Journal ArticleDOI

Detection of Voltage Anomalies in Spacecraft Storage Batteries Based on a Deep Belief Network

TL;DR: Based on storage battery-related telemetry parameter data downloaded from an in-orbit satellite, a voltage anomaly detection algorithm for spacecraft storage batteries based on a deep belief network (DBN) is proposed, which supports the detection of anomalies in the state-of-health of a storage battery in a timely fashion.
Dissertation

Application of power laws to biometrics, forensics and network traffic analysis

Aamo Iorliam
TL;DR: The experiments show that the biometric samples do follow the Benford’s law; and that the highest detection and localisation accuracies for theBiometric face images and fingerprint images are achieved at 97.41% and 96.40%, respectively.
Proceedings ArticleDOI

An intrusion detection system integrating network-level intrusion detection and host-level intrusion detection

TL;DR: This paper proposes an efficient scalable neural-network-based hybrid IDS framework with the combination of Host-level IDS (HIDS), and designed HIDS using word embedding and convolutional neural network.
Journal ArticleDOI

Anomaly-based framework for detecting dynamic spectrum access attacks in cognitive radio networks

TL;DR: The proposed ABD algorithm provides the ability to effectively detect the different types of CRNs security attacks and simulation results show that CR-IDS can detect DSA attacks with high detection rate and very low false negative and false positive probabilities.
References
More filters
Journal ArticleDOI

LOF: identifying density-based local outliers

TL;DR: This paper contends that for many scenarios, it is more meaningful to assign to each object a degree of being an outlier, called the local outlier factor (LOF), and gives a detailed formal analysis showing that LOF enjoys many desirable properties.
Book ChapterDOI

Fast effective rule induction

TL;DR: This paper evaluates the recently-proposed rule learning algorithm IREP on a large and diverse collection of benchmark problems, and proposes a number of modifications resulting in an algorithm RIPPERk that is very competitive with C4.5 and C 4.5rules with respect to error rates, but much more efficient on large samples.
Book

Outliers in Statistical Data

Vic Barnett, +1 more
TL;DR: In this article, the authors present an updated version of the reference work on outliers, including new areas of study such as outliers in direction data as well as developments in fields such as discordancy tests for univariate and multivariate samples.
Journal ArticleDOI

An Intrusion-Detection Model

TL;DR: A model of a real-time intrusion-detection expert system capable of detecting break-ins, penetrations, and other forms of computer abuse is described, based on the hypothesis that security violations can be detected by monitoring a system's audit records for abnormal patterns of system usage.
Related Papers (5)