2003
DOI: 10.1615/jautomatinfscien.v35.i8.10
|View full text |Cite
|
Sign up to set email alerts
|

Adaptive Anomaly Detection in the Behavior of Computer Systems Users on the Basis of Markov Chains of Variable Order. Part II. Anomaly Detection Methods and Experimental Results

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2019
2019
2019
2019

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(2 citation statements)
references
References 0 publications
0
2
0
Order By: Relevance
“…The disadvantage of many neural networks is their poor fitness to process non-ordered datasets. Introducing an artificial order on a set of element values will only distort the picture, since the neural network will recalculate weights according to the proximity of numerical values; d) based on a finite automata (state machine) synthesis [6,9,18,19,20]. The main disadvantage of this approach is the complex process of building a state machine by parsing the attack scenario.…”
Section: Existing Approachesmentioning
confidence: 99%
See 1 more Smart Citation
“…The disadvantage of many neural networks is their poor fitness to process non-ordered datasets. Introducing an artificial order on a set of element values will only distort the picture, since the neural network will recalculate weights according to the proximity of numerical values; d) based on a finite automata (state machine) synthesis [6,9,18,19,20]. The main disadvantage of this approach is the complex process of building a state machine by parsing the attack scenario.…”
Section: Existing Approachesmentioning
confidence: 99%
“…Analysis of research results published in [3,4,5,6,7,8], as well as reports of major information security systems developers, showed that there is no single effective algorithm for denial-of-service attack detection and mitigation. Usually, vendows offer an expensive solution implementing a hybrid algorithm based on signature search methods and blacklisting attacker node IP addresses as a form of mitigation.…”
Section: Introductionmentioning
confidence: 99%