2009
DOI: 10.1109/mnet.2009.4804320
|View full text |Cite
|
Sign up to set email alerts
|

Accurate anomaly detection through parallelism

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
11
0

Year Published

2010
2010
2024
2024

Publication Types

Select...
4
4
1

Relationship

0
9

Authors

Journals

citations
Cited by 38 publications
(11 citation statements)
references
References 14 publications
0
11
0
Order By: Relevance
“…False positive (FP) and false negative (FN) are two indicators to assess the degree of accuracy. The former occurs when IDS incorrectly identifies benign activity as being malicious, whereas the latter comes about if IDS fails to identify malicious activity (Stavroulakis and Stamp, 2010;Elshousha and Osmanb, 2011;Shanbhag and Wolf, 2009;Ho et al, 2012). Under the circumstances of failing to have the best of both worlds, many security administrators prefer decreasing FNs to increasing FPs due to the high security consideration.…”
Section: Technology Typesmentioning
confidence: 99%
“…False positive (FP) and false negative (FN) are two indicators to assess the degree of accuracy. The former occurs when IDS incorrectly identifies benign activity as being malicious, whereas the latter comes about if IDS fails to identify malicious activity (Stavroulakis and Stamp, 2010;Elshousha and Osmanb, 2011;Shanbhag and Wolf, 2009;Ho et al, 2012). Under the circumstances of failing to have the best of both worlds, many security administrators prefer decreasing FNs to increasing FPs due to the high security consideration.…”
Section: Technology Typesmentioning
confidence: 99%
“…To mitigate this variation, we employ an ensemble anomaly detection method [8] that exploits the multiple baseline models trained using multiple sets of labeled-and-sampled/sampled-andlabeled data. A similar idea proposed in [25][26][27] exploits multiple existing anomaly detection systems in parallel. Since the multiple sets of labeled-andsampled/sampled-and-labeled data would have information about different features of the normal behavior of network traffic, the ensemble of the multiple baseline models trained using these heterogeneous data improves performance in anomaly detection more effectively than using a single baseline model.…”
Section: Ensemble Anomaly Detection Using Multiple Baseline Modelsmentioning
confidence: 99%
“…A number of these approaches are variations of the change detection method, e.g., adaptive threshold [12], cumulative sum [13], wavelets [14], and maximum entropy [15]. In addition, an approach exploiting multiple existing anomaly detection algorithms in parallel has been used to increase the accuracy of anomaly detection [16].…”
Section: Related Work a Intrusion Detectionmentioning
confidence: 99%
“…Therefore, to mitigate the performance variation, we also devised an unsupervised ensemble anomaly detection method that exploits multiple baseline distributions trained using multiple sets of sampled data. A similar idea is proposed in [16], which exploits multiple existing anomaly detection systems in parallel. Our method does simultaneous time-periodical packet samplings.…”
Section: B Ensemble Anomaly Detection Using Multiple Baseline Modelsmentioning
confidence: 99%