2006 Securecomm and Workshops 2006
DOI: 10.1109/seccomw.2006.359576
|View full text |Cite
|
Sign up to set email alerts
|

Flow Anomaly Detection in Firewalled Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
7
0

Year Published

2012
2012
2017
2017

Publication Types

Select...
4
4

Relationship

0
8

Authors

Journals

citations
Cited by 10 publications
(7 citation statements)
references
References 11 publications
0
7
0
Order By: Relevance
“…The acceleration of agent i is ) (t ac i which is at iteration t. The last variable is gbest which is the best solution. The positions of agents are updated after each iteration as in (10). The process of updating velocity and positions is stopped when the end criterion is met [15].…”
Section: A Cuckoo Optimization Algorithmmentioning
confidence: 99%
See 1 more Smart Citation
“…The acceleration of agent i is ) (t ac i which is at iteration t. The last variable is gbest which is the best solution. The positions of agents are updated after each iteration as in (10). The process of updating velocity and positions is stopped when the end criterion is met [15].…”
Section: A Cuckoo Optimization Algorithmmentioning
confidence: 99%
“…Data mining and visualization are combined in [9] to propose a flow-based botnet detection system. Statistical techniques are deployed in another paper to provide real-time anomaly detection in network flows in a controlled environment [10]. The statistically modeled patterns can be deployed for the prediction of activities.…”
Section: Introductionmentioning
confidence: 99%
“…In this approach, the common properties of network packets are analyzed instead of the packet contents. The advantage of flow-based approaches is that only a fraction of network data is analyzed to detect the attacks [3][4][5].…”
Section: Introductionmentioning
confidence: 99%
“…Different methods have been used in developing flowbased anomaly detection systems such as support vector machine (SVM) [3], hidden Markov model [5], selforganising map (SOM) neural network [6], modified random-mutation hill-climbing and C4.5 (MRMHC-C4.5) algorithm [7], frequent pattern mining algorithm [8], data mining and visualization [9], statistical techniques [10], chi-square technique [11], semi-supervised methods [12], and artificial neural networks (ANNs), e.g. multilayer perceptron (MLP) [13].…”
Section: Introductionmentioning
confidence: 99%