2016 IEEE 16th International Conference on Data Mining Workshops (ICDMW) 2016
DOI: 10.1109/icdmw.2016.0051
|View full text |Cite
|
Sign up to set email alerts
|

Correlation-Based Streaming Anomaly Detection in Cyber-Security

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2017
2017
2024
2024

Publication Types

Select...
2
1
1

Relationship

1
3

Authors

Journals

citations
Cited by 4 publications
(6 citation statements)
references
References 13 publications
0
6
0
Order By: Relevance
“…A compromise is to inject anomalies representative of attacks in real datasets [16]. In [5] the performance of SCAD was evaluated on real data with contrived anomalies induced by data contamination. Here, we conduct a more rigorous and complete simulation study to capture all performance aspects of our method and its competitors.…”
Section: Discussionmentioning
confidence: 99%
See 2 more Smart Citations
“…A compromise is to inject anomalies representative of attacks in real datasets [16]. In [5] the performance of SCAD was evaluated on real data with contrived anomalies induced by data contamination. Here, we conduct a more rigorous and complete simulation study to capture all performance aspects of our method and its competitors.…”
Section: Discussionmentioning
confidence: 99%
“…In [5], we looked at a small subset (62 edges) of the Los Alamos National Laboratory (LANL) Netflow data from the "Comprehensive, Multi-Source Cyber-Security Events" data set [18]. A key finding in that study was that SCAD revealed multiple network correlation anomalies at similar times with known suspicious behaviour.…”
Section: Demonstration Planmentioning
confidence: 99%
See 1 more Smart Citation
“…Consequently, as the system depends on the dataset chosen to validate, it is important to use an updated, unknown to the rivals and reliable set to capture all possible insights. Although a few methods provided originals and updated instances [21,[23][24][25][26][27], a lot of research work relied on deprecated, static and often biased datasets [19,20,28,29] that lead to an endemic situation where numerous reported results are not applicable in real-world scenarios. Alongside the inability to cope with the most recent attacks and threats, these shortcomings have been disclosed by [30,31].…”
Section: State Of the Artmentioning
confidence: 99%
“…Despite the ability to process vast amounts of instances, most of the models fail to see security from an outlier or anomaly detection perspective in a streaming context. There are a few models that provide real-time options or stream processing [23,26,27], but most of them have an offline status preventing the solution from achieving robustness to adversarial threats or concept drifts [19,21,24,33,34].…”
Section: State Of the Artmentioning
confidence: 99%