DOI: 10.1007/978-3-540-87403-4_19
|View full text |Cite
|
Sign up to set email alerts
|

A Comparative Evaluation of Anomaly Detectors under Portscan Attacks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
22
0

Publication Types

Select...
5
2
1

Relationship

1
7

Authors

Journals

citations
Cited by 25 publications
(22 citation statements)
references
References 29 publications
0
22
0
Order By: Relevance
“…As such, so has the prevalence of port scanning, a method many of these systems employ to ascertain their next victims [6]. Due to this increase, and the direct correlation with network attacks [4], many detection mechanisms have been developed.…”
Section: A Port Scansmentioning
confidence: 99%
See 1 more Smart Citation
“…As such, so has the prevalence of port scanning, a method many of these systems employ to ascertain their next victims [6]. Due to this increase, and the direct correlation with network attacks [4], many detection mechanisms have been developed.…”
Section: A Port Scansmentioning
confidence: 99%
“…As the growth of these malware attacks continues (136% alone between 2007 and 2008 [5]), so does the prevalence of port scans. To this end much work has been done towards the detection of such activity, with varying degrees of success and application [6]- [9]. The port scan is a well understood network activity, as such allows us to validate the success of our GP in creating network traffic.…”
Section: Introductionmentioning
confidence: 99%
“…Many methods have been developed for network intrusion detection, such as machine learning, data mining, neural networks, statistical methodology, wavelet analysis, etc. [7,[12][13][14][15][16]. Though intrusion detection systems (IDSs) are not developed for forensic analysis, investigators have recognized that IDSs are an important evidence source for network forensics because it is probably the most likely candidate to provide first-hand information about security violations in the network [6].…”
Section: Intrusion Detection Systems and Some Novel Attacksmentioning
confidence: 99%
“…Malware, botnets, spam, phishing, and denial-of-server attacks have become continuous and imminent threats for today's networks and hosts [7,8]. For example, 76% used a keystroke-logging component to steal information such as online banking account credentials in 2008 [8].…”
Section: Intrusion Detection Systems and Some Novel Attacksmentioning
confidence: 99%
“…Section 3 gives a brief description of the evaluated anomaly detection systems and the datasets used. Section 4 provides the comparative performance evaluation results in the form of ROC curves on the two datasets [53]. Section 5 provides the lessons learnt from the comparative performance evaluation of prominent NADSs.…”
Section: Introductionmentioning
confidence: 99%