2019
DOI: 10.1049/iet-ifs.2018.5186
|View full text |Cite
|
Sign up to set email alerts
|

Detecting anomalous traffic in the controlled network based on cross entropy and support vector machine

Abstract: Network anomaly detection is an effective way for analysing and detecting malicious attacks. However, the typical anomaly detection techniques cannot perform the desired effect in the controlled network just as in the general network. In the circumstance of the controlled network, the detection performance will be lowered due to its special characteristics including the stronger regularity, higher dimensionality and subtler fluctuation of its traffic. On the motivation, the study proposes a novel classifier fr… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
15
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
6
3
1

Relationship

0
10

Authors

Journals

citations
Cited by 29 publications
(15 citation statements)
references
References 30 publications
0
15
0
Order By: Relevance
“…Some information theory-based metrics are particularly popular in the detection of (D)DoS attacks. In information theory, Shannon's entropy [29] is a measure of uncertainty associated with a random variable and it is assumed as one of the most effective methods for detecting abnormal traffic [30,31].…”
Section: Entropy-based Detectionmentioning
confidence: 99%
“…Some information theory-based metrics are particularly popular in the detection of (D)DoS attacks. In information theory, Shannon's entropy [29] is a measure of uncertainty associated with a random variable and it is assumed as one of the most effective methods for detecting abnormal traffic [30,31].…”
Section: Entropy-based Detectionmentioning
confidence: 99%
“…Reference [20] proposed a detection method based on the k-means algorithm with information entropy. This method calculates data features based on the entropy value, compares normal data with unknown data, and makes judgments based on the comparative analysis.…”
Section: Related Workmentioning
confidence: 99%
“…They use the C-means clustering and fuzzy interpolation algorithm to effectively detect the intrusion in the network. Han [2] proposed the system to detect the anomalous traffic in the network controller. The authors use the novel classifier technics to detect the intrusion in the controller network devices.…”
Section: Literature Surveymentioning
confidence: 99%