2018
DOI: 10.1109/tnet.2017.2765719
|View full text |Cite
|
Sign up to set email alerts
|

Anomaly Detection and Attribution in Networks With Temporally Correlated Traffic

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
39
0
3

Year Published

2019
2019
2022
2022

Publication Types

Select...
5
4
1

Relationship

2
8

Authors

Journals

citations
Cited by 72 publications
(42 citation statements)
references
References 29 publications
0
39
0
3
Order By: Relevance
“…is a widely and deeply studied research problem. Past works have developed solutions based on varying approches, for example, rule-based systems [9], information theoretic techniques [10], [11], signal analysis [12], statistical models and hypothesis testing [13], [14], as well as data mining and machine learning algorithms [15], [16]. As computational resources becoming cheaper, there has been an increasing interest in applying machine learning techniques for detecting anomalies in network.…”
Section: Related Workmentioning
confidence: 99%
“…is a widely and deeply studied research problem. Past works have developed solutions based on varying approches, for example, rule-based systems [9], information theoretic techniques [10], [11], signal analysis [12], statistical models and hypothesis testing [13], [14], as well as data mining and machine learning algorithms [15], [16]. As computational resources becoming cheaper, there has been an increasing interest in applying machine learning techniques for detecting anomalies in network.…”
Section: Related Workmentioning
confidence: 99%
“…Machine learning (including deep learning) has been increasingly employed for security purposes, such as anomaly detection [34], [35], malicious domain detection [8], etc. In this section, we provide the background on phishing classifiers, including the different features used for building ML-based classifiers.…”
Section: Motivationmentioning
confidence: 99%
“…The source and destination IP addresses in the packets can be treated as different hosts or users, and we can perform anomaly detection by analyzing the communication patterns among those hosts [19], [20], [21]. There are a number of statistical methods can be used for this kind of pattern analysis, such as the Markov chain and binary composite hypothesis testing [22], [23], [24]. However, with the increasing number of network users and bandwidth, especially sophisticated hackers, they tend to gradually change their behaviors.…”
Section: Related Workmentioning
confidence: 99%