Proceedings of the 9th International Conference on Security of Information and Networks 2016
DOI: 10.1145/2947626.2947643
|View full text |Cite
|
Sign up to set email alerts
|

Algorithms for network server anomaly behavior detection without traffic content inspection

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
2
2

Relationship

1
3

Authors

Journals

citations
Cited by 4 publications
(4 citation statements)
references
References 8 publications
0
4
0
Order By: Relevance
“…Moreover, the proposed IDS can only detect the known types of assaults which can be detected from the routed packets sent from the other devices in the IoT environment. Eliseev and Gurina [100] proposed an intrusion scheme which is able to observe the abnormal behaviour of the devices in the IoT environment. Teir proposed intrusion system uses a correlation function which is based on the request-response method.…”
Section: Ids Based On Anomaly Detection Anomaly Intrusion Detection I...mentioning
confidence: 99%
“…Moreover, the proposed IDS can only detect the known types of assaults which can be detected from the routed packets sent from the other devices in the IoT environment. Eliseev and Gurina [100] proposed an intrusion scheme which is able to observe the abnormal behaviour of the devices in the IoT environment. Teir proposed intrusion system uses a correlation function which is based on the request-response method.…”
Section: Ids Based On Anomaly Detection Anomaly Intrusion Detection I...mentioning
confidence: 99%
“…Since information processing takes some time, the timing of the response data stream also should be considered as an important characteristic. The cross-correlation function (XCF) for the time series of the incoming and outgoing web server traffic intensity was adopted as a formalized characteristic that combines both sizes and timing [33].…”
Section: Principles Of the Proposed Approachmentioning
confidence: 99%
“…As noted earlier, the set of features on which it is proposed to detect anomalous behavior is the correlation characteristics between the intensity of incoming and outgoing traffic, characterizing the processing of incoming requests. In this case, both Pearson correlation coefficients [32] and the correlation functions [33] can be used. The number of points in the XCF in discrete time is thus the dimension of the feature space in which one can attempt to construct a region of normal queries.…”
Section: Features Of the Normal Processingmentioning
confidence: 99%
See 1 more Smart Citation