scispace - formally typeset
Open AccessProceedings Article

Learning Nonstationary Models of Normal Network Traffic for Detecting Novel Attacks, Edmonton, Alberta

M. Mahoney
Reads0
Chats0
About
This article is published in Knowledge Discovery and Data Mining.The article was published on 2002-01-01 and is currently open access. It has received 332 citations till now.

read more

Citations
More filters
Journal ArticleDOI

Anomaly detection: A survey

TL;DR: This survey tries to provide a structured and comprehensive overview of the research on anomaly detection by grouping existing techniques into different categories based on the underlying approach adopted by each technique.
Journal ArticleDOI

Anomaly-based network intrusion detection: Techniques, systems and challenges

TL;DR: The main challenges to be dealt with for the wide scale deployment of anomaly-based intrusion detectors, with special emphasis on assessment issues are outlined.
Journal ArticleDOI

An overview of anomaly detection techniques: Existing solutions and latest technological trends

TL;DR: This paper provides a comprehensive survey of anomaly detection systems and hybrid intrusion detection systems of the recent past and present and discusses recent technological trends in anomaly detection and identifies open problems and challenges in this area.
Journal ArticleDOI

Review: A review of novelty detection

TL;DR: This review aims to provide an updated and structured investigation of novelty detection research papers that have appeared in the machine learning literature during the last decade.
Book

Outlier Analysis

TL;DR: Outlier Analysis is a comprehensive exposition, as understood by data mining experts, statisticians and computer scientists, and emphasis was placed on simplifying the content, so that students and practitioners can also benefit.
References
More filters
Journal ArticleDOI

Wide area traffic: the failure of Poisson modeling

TL;DR: It is found that user-initiated TCP session arrivals, such as remote-login and file-transfer, are well-modeled as Poisson processes with fixed hourly rates, but that other connection arrivals deviate considerably from Poisson.
Proceedings Article

Snort - Lightweight Intrusion Detection for Networks

TL;DR: Snort provides a layer of defense which monitors network traffic for predefined suspicious activity or patterns, and alert system administrators when potential hostile traffic is detected.
Proceedings Article

Bro: a system for detecting network intruders in real-time

TL;DR: Bro as mentioned in this paper is a stand-alone system for detecting network intruders in real-time by passively monitoring a network link over which the intruder's traffic transits, which emphasizes high-speed (FDDI-rate) monitoring, realtime notification, clear separation between mechanism and policy and extensibility.
Proceedings ArticleDOI

A sense of self for Unix processes

TL;DR: A method for anomaly detection is introduced in which "normal" is defined by short-range correlations in a process' system calls, and initial experiments suggest that the definition is stable during normal behaviour for standard UNIX programs.

Insertion, Evasion, and Denial of Service: Eluding Network Intrusion Detection

TL;DR: Three classes of attacks which exploit fundamentally problems with the reliability of passive protocol analysis are defined--insertion, evasion and denial of service attacks--and how to apply these three types of attacks to IP and TCP protocol analysis is described.