2013
DOI: 10.5120/13715-1478
|View full text |Cite
|
Sign up to set email alerts
|

Machine Learning Techniques for Anomaly Detection: An Overview

Abstract: Intrusion detection has gain a broad attention and become a fertile field for several researches, and still being the subject of widespread interest by researchers. The intrusion detection community still confronts difficult problems even after many years of research. Reducing the large number of false alerts during the process of detecting unknown attack patterns remains unresolved problem. However, several research results recently have shown that there are potential solutions to this problem. Anomaly detect… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
109
0
2

Year Published

2015
2015
2023
2023

Publication Types

Select...
8

Relationship

0
8

Authors

Journals

citations
Cited by 238 publications
(111 citation statements)
references
References 50 publications
(21 reference statements)
0
109
0
2
Order By: Relevance
“…The part of features of the attacks was admitted according to [28,29]. Table 1 Average number of rules, matrices and training steps of ASDCA for detection of typical classes of cyber-attacks in MCCS Note: * -according to data [1,2,15,24,28,29]; ** -features and their information content according to data [28,29]; *** -according to data [1,2,16,24]; **** -according to data [6,8,15,19,24] To test the effectiveness of the proposed model, a series of experiments for main attacks was conducted, shown in Table 1. The example of test results for attacks on SCADA systems is shown in Fig.…”
Section: The Program Of the Search Of The Minimally Needed Numbers Ofmentioning
confidence: 99%
See 2 more Smart Citations
“…The part of features of the attacks was admitted according to [28,29]. Table 1 Average number of rules, matrices and training steps of ASDCA for detection of typical classes of cyber-attacks in MCCS Note: * -according to data [1,2,15,24,28,29]; ** -features and their information content according to data [28,29]; *** -according to data [1,2,16,24]; **** -according to data [6,8,15,19,24] To test the effectiveness of the proposed model, a series of experiments for main attacks was conducted, shown in Table 1. The example of test results for attacks on SCADA systems is shown in Fig.…”
Section: The Program Of the Search Of The Minimally Needed Numbers Ofmentioning
confidence: 99%
“…The indicator of danger of each cyber threat depends on the values of a set of factors that increase or decrease the protection of MCCS from a given threat. The indicators, decreasing protection of MCCS are considered to be risk indicators [24], and those increasing it − protection indicators [4,6]. To formalize the dependency of MCCS's degree of protection on corresponding values, one can apply one of the following approaches [16,19,24]: 1) a cyber threat within a class depends on one indicator, i.e.…”
Section: The Model Of Logical Procedures Of Detection Of Anomalies Anmentioning
confidence: 99%
See 1 more Smart Citation
“…Neural networks and Hidden Markov Model have been proved to be useful techniques at the network traffic level as shown in in [9] and [10]. However, using ML algorithms in a highly dynamic environment like service clouds have several drawbacks such as increasing performance overhead, storage requirements, and computational expense [11].…”
Section: Related Workmentioning
confidence: 99%
“…In a general case, the problem of detection of cyber-attacks to MCIS boils down to the following (Omar, Ngadi, & Jebur, 2013) (Tsai, Hsub, Linc, & Lin, 2009). A certain set of objects is explored; in our case, this is NPT − the number of possible targets from the side that attacks MCIS.…”
Section: The Model Of Logical Procedures Of Detection Of Anomalies Anmentioning
confidence: 99%