2008 International Conference on Convergence and Hybrid Information Technology 2008
DOI: 10.1109/ichit.2008.249
|View full text |Cite
|
Sign up to set email alerts
|

Network Anomaly Detection System: The State of Art of Network Behaviour Analysis

Abstract: This paper presents a taxonomy of anomaly detection techniques that is then used to survey and classify a number of research prototypes and commercial products. Commercial products and solutions based anomaly detection techniques are beginning to establish themselves in mainstream security solutions alongside firewalls, intrusion prevention systems and network monitoring solutions. These solutions are focused mainly on network-based anomaly detection, thus creating a new industry buzzword that describes it: Ne… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
13
0

Year Published

2011
2011
2020
2020

Publication Types

Select...
5
2
2

Relationship

0
9

Authors

Journals

citations
Cited by 27 publications
(13 citation statements)
references
References 10 publications
0
13
0
Order By: Relevance
“…The machine learning type generates a whitelist or threshold that distinguishes anomaly from the normal users' communications [7]. The statistical analysis type finds anomaly connections, hosts, or packets as outliers [8].…”
Section: Related Workmentioning
confidence: 99%
“…The machine learning type generates a whitelist or threshold that distinguishes anomaly from the normal users' communications [7]. The statistical analysis type finds anomaly connections, hosts, or packets as outliers [8].…”
Section: Related Workmentioning
confidence: 99%
“…They differ according to the information used for analysis and according to techniques that are used to detect deviations from normal behavior. Lim and Jones in [3] proposed two types of anomaly detection techniques based on employed techniques: the learning model method and the specification model. The learning approach is based on the application of machine learning techniques, to automatically obtain a representation of normal behaviors from the analysis of system activities.…”
Section: Related Workmentioning
confidence: 99%
“…Commercial products applying rule based, statistical based, model based and neural networks approach to detected anomalies are briefly described in [3].…”
Section: Fig 1 Taxonomy Of Anomaly Detection Behavioral Model (Basementioning
confidence: 99%
“…Discriminant models are inherently supervised. In [16], both learning-based and specification-based behavior models are reviewed as applied to intrusion detection. This paper looks at the learning-based approach in terms taxonomy defined as: rule-based, modelbased, and statistical based.…”
Section: B Generative and Discriminative Approaches In Intrusion Detmentioning
confidence: 99%