2021
DOI: 10.1109/jsac.2021.3078497
|View full text |Cite
|
Sign up to set email alerts
|

Machine Learning for Detecting Anomalies and Intrusions in Communication Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
12
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
2
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 35 publications
(12 citation statements)
references
References 51 publications
0
12
0
Order By: Relevance
“…In 2017, Schlamp et al [8] have implemented HEAP in BGL to analyse hijacking alarms. The Internet routing registry was used to determine the commercial or corporate relationships between the event's participants.…”
Section: A Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…In 2017, Schlamp et al [8] have implemented HEAP in BGL to analyse hijacking alarms. The Internet routing registry was used to determine the commercial or corporate relationships between the event's participants.…”
Section: A Related Workmentioning
confidence: 99%
“…From the "lowest to the largest value," it shows how uniformly the data elements are distributed through time [8]. D % of data values were under D percentile, while 100-D % are upon th J percentile.…”
Section: Percentilementioning
confidence: 99%
See 1 more Smart Citation
“…Methods for detecting attacks in networks include three ways: "signature-based detection", That matches the signature of the known attack with the current traffic, "anomaly-based detection", Depends on visualizing a normal or legitimate profile obtained under normal network conditions without attacks, and comparing the network's actions with it for identify anomalies and "specification-based detection", This type depends on matching the predetermined and memorized specification with the criteria or specification to detect a certain programmer's operation and notify any violation of such criteria [8]- [10].…”
Section: Introductionmentioning
confidence: 99%
“…Existing researches [6], [7], [8] have shown that the abnormal behaviors of VMs usually come with a significant change in resource metrics, so it is a good way to implement anomaly detection for VMs by collecting and analyzing its multi-dimensional resource metrics data. Although there have been many interesting researches for anomaly detection, including statistical and probability methods [9], [10], distance-based methods [11], [12], domain-based methods [13], [14], reconstruction-based methods [15], [16], [17], and information theory based methods [18], as classified in [19], detecting anomalies of VMs in virtualized network slicing environment still faces many challenges:…”
Section: Introductionmentioning
confidence: 99%