2008
DOI: 10.1109/jcn.2008.6388332
|View full text |Cite
|
Sign up to set email alerts
|

Mutual information applied to anomaly detection

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
6
0
1

Year Published

2014
2014
2019
2019

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 15 publications
(7 citation statements)
references
References 6 publications
0
6
0
1
Order By: Relevance
“…Although Tsallis entropy seems to be more popular than Renyi entropy in the context of network anomaly detection the latter was also successfully applied in detection of different anomalies. An example is the work by Yang et al [10] who employed Renyi entropy to early detection of low-rate DDoS attacks and Kopylova et al [11] who reported positive results of using Renyi conditional entropy in detection of selected worms. We believe that with parameterized entropy some limitations of Shannon entropy caused by small descriptive capability [9] which results in a little ability to detect typical small or low-rate anomalies can be overcome.…”
Section: Detection Via Feature Distributionsmentioning
confidence: 99%
See 1 more Smart Citation
“…Although Tsallis entropy seems to be more popular than Renyi entropy in the context of network anomaly detection the latter was also successfully applied in detection of different anomalies. An example is the work by Yang et al [10] who employed Renyi entropy to early detection of low-rate DDoS attacks and Kopylova et al [11] who reported positive results of using Renyi conditional entropy in detection of selected worms. We believe that with parameterized entropy some limitations of Shannon entropy caused by small descriptive capability [9] which results in a little ability to detect typical small or low-rate anomalies can be overcome.…”
Section: Detection Via Feature Distributionsmentioning
confidence: 99%
“…Therefore, a proper network anomaly detection as one of possible solutions to complement signature-based solutions is essential. Recently, entropy-based methods which rely on network feature distributions has been of a great interest [6][7][8][9][10][11]. It is crucial to check if entropy-based approach is efficient in detection of anomalous network activities caused by modern botnet-like malware [12].…”
Section: Introductionmentioning
confidence: 99%
“…In opposite, Tellenbach in [21] reported no correlation among header-based features. Parameterized entropy-based approach for network anomaly detection is promising, what is confirmed by Tellenbach [21], who employed Tsallis entropy in his Traffic Entropy Telescope prototype capable to detect a broad spectrum of anomalies, Yang [23], who applied Renyi entropy to early detection of low-rate DDoS attacks detection, and Kopylova [15], who reported positive results of using Renyi conditional entropy in detection of selected fast spreading or aggressive worms. There are some limitations of entropy based detection especially when it comes to detecting small or slow attacks.…”
Section: Related Workmentioning
confidence: 94%
“…In terms of research, we need to focus more on multivariate interactions; e.g., removing individual variable effects using mutual information. [43,44] Finally, the applied metrics need to be characterized with respect to alternative statistical methods such as effect size analysis to facilitate practical interpretation of the metrics.…”
Section: Future Workmentioning
confidence: 99%