2015
DOI: 10.1109/comst.2014.2336610
|View full text |Cite
|
Sign up to set email alerts
|

A Survey of Distance and Similarity Measures Used Within Network Intrusion Anomaly Detection

Abstract: Anomaly detection (AD) use within the network intrusion detection field of research, or network intrusion AD (NIAD), is dependent on the proper use of similarity and distance measures, but the measures used are often not documented in published research. As a result, while the body of NIAD research has grown extensively, knowledge of the utility of similarity and distance measures within the field has not grown correspondingly. NIAD research covers a myriad of domains and employs a diverse array of techniques … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
81
0

Year Published

2016
2016
2023
2023

Publication Types

Select...
7
2
1

Relationship

0
10

Authors

Journals

citations
Cited by 191 publications
(81 citation statements)
references
References 107 publications
0
81
0
Order By: Relevance
“…Existing intrusion detection and prevention models generally use statistical approaches [15] such as Hidden Markov Model (HMM) [15], Bayes theory [16], cluster analysis [17], signal processing [18] and distance measuring [19] to detect anomalous activities. Anomaly detection approaches can be broadly categorized into supervised and unsupervised learning [6].…”
Section: Related Workmentioning
confidence: 99%
“…Existing intrusion detection and prevention models generally use statistical approaches [15] such as Hidden Markov Model (HMM) [15], Bayes theory [16], cluster analysis [17], signal processing [18] and distance measuring [19] to detect anomalous activities. Anomaly detection approaches can be broadly categorized into supervised and unsupervised learning [6].…”
Section: Related Workmentioning
confidence: 99%
“…where U is the (c × n) partition matrix, V = {v 1 , v 2 , ..., v c } is the vector of c cluster centers (prototypes) in d , m > 1 is the fuzzification constant, and ||.|| A is any inner product A-induced norm [18], i.e., ||X|| A = √ X T AX or the distance function such as Minkowski distance, presented by Eq. (5).…”
Section: Arxiv:190203127v1 [Cslg] 8 Feb 2019mentioning
confidence: 99%
“…This is a new metric which is designed to identify the connection between similarity of suspicious activities of a mobile client and other mobile devices in a network. The Pearson product correlation shown in formula 5 is selected to implement the proposed correlation index as it is commonly used in linear regression [27]. Similar to the HIS and VSI explained in the previous section, the correlation index is a retrospective metric.…”
Section: Correlation Indexmentioning
confidence: 99%