2012 International Conference on Cyber Security 2012
DOI: 10.1109/cybersecurity.2012.12
|View full text |Cite
|
Sign up to set email alerts
|

A Contextual Anomaly Detection Approach to Discover Zero-Day Attacks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
20
0

Year Published

2013
2013
2020
2020

Publication Types

Select...
5
2
2

Relationship

1
8

Authors

Journals

citations
Cited by 36 publications
(21 citation statements)
references
References 12 publications
1
20
0
Order By: Relevance
“…This component is evaluated over the records individually to determine whether connections between records indicate anomalous values. The work presented by AlEroud et al [14] is similar to the work presented in this paper in that the detection is composed of two distinct modules. However, the content component of their work involves calculating difficult distance measures that are not always easily definable.…”
Section: Profilementioning
confidence: 53%
See 1 more Smart Citation
“…This component is evaluated over the records individually to determine whether connections between records indicate anomalous values. The work presented by AlEroud et al [14] is similar to the work presented in this paper in that the detection is composed of two distinct modules. However, the content component of their work involves calculating difficult distance measures that are not always easily definable.…”
Section: Profilementioning
confidence: 53%
“…A different approach for contextual detection is that work of AlEroud et al [14], who apply contextual anomaly detection to uncover zero-day cyber attacks. Their work involves two distinct steps, similar to the modules described in this paper: contextual misuse module, and an anomaly detection technique.…”
Section: Profilementioning
confidence: 99%
“…A different approach for contextual detection is that work of AlEroud et al [19], who apply contextual anomaly detection to uncover zero-day cyber attacks. Their work involves two distinct steps, similar to the modules described in this paper: contextual misuse module, and an anomaly detection technique.…”
Section: Processing Pipelinementioning
confidence: 99%
“…Contextual Anomaly Detection [17] is a contextual misuse and anomaly detection prototype to detect zeroday attacks. The contextual misuse detection utilizes similarity with attack context profiles, and the anomaly detection technique identifies new types of attacks using the One Class Nearest Neighbor (1-NN) algorithm.…”
Section: Related Workmentioning
confidence: 99%