2020 International Conference on COMmunication Systems &Amp; NETworkS (COMSNETS) 2020
DOI: 10.1109/comsnets48256.2020.9027422
|View full text |Cite
|
Sign up to set email alerts
|

A Lightweight Intrusion Detection System using Benford's Law and Network Flow Size Difference

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
2
2

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(1 citation statement)
references
References 10 publications
0
1
0
Order By: Relevance
“…Consequently, such features were considered significant for detecting zeroday attacks. Specifically, we found that a feature is deemed significant if it simultaneously obeys one of Benford's law distributions on benign network traffic and violates Benford's law distributions on malicious network traffic [33], [47], [48]. Network features that did not satisfy this condition were not deemed to be significant, as they failed to differentiate between benign and zero-day network traffic [33], [34] and considered benign and zero-day network traffic to display similar behaviour.…”
Section: A Feature Selection Resultsmentioning
confidence: 95%
“…Consequently, such features were considered significant for detecting zeroday attacks. Specifically, we found that a feature is deemed significant if it simultaneously obeys one of Benford's law distributions on benign network traffic and violates Benford's law distributions on malicious network traffic [33], [47], [48]. Network features that did not satisfy this condition were not deemed to be significant, as they failed to differentiate between benign and zero-day network traffic [33], [34] and considered benign and zero-day network traffic to display similar behaviour.…”
Section: A Feature Selection Resultsmentioning
confidence: 95%