2014
DOI: 10.1007/978-3-662-45237-0_43
|View full text |Cite
|
Sign up to set email alerts
|

Network Anomaly Detection Using Parameterized Entropy

Abstract: Abstract. Entropy-based anomaly detection has recently been extensively studied in order to overcome weaknesses of traditional volume and rule based approaches to network flows analysis. From many entropy measures only Shannon, Titchener and parameterized Renyi and Tsallis entropies have been applied to network anomaly detection. In the paper, our method based on parameterized entropy and supervised learning is presented. With this method we are able to detect a broad spectrum of anomalies with low false posit… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
13
0

Year Published

2014
2014
2022
2022

Publication Types

Select...
5
3
1

Relationship

5
4

Authors

Journals

citations
Cited by 21 publications
(13 citation statements)
references
References 18 publications
0
13
0
Order By: Relevance
“…To produce synthetic anomaly traces a dedicated tool in Python language was developed. More details about the tool and the generation process can be found in our research [126].…”
Section: Legitimate Trafficmentioning
confidence: 99%
“…To produce synthetic anomaly traces a dedicated tool in Python language was developed. More details about the tool and the generation process can be found in our research [126].…”
Section: Legitimate Trafficmentioning
confidence: 99%
“…Great effort has been put lately in static analysis of malicious codes because this technique generally has brought good accuracy in malware detection [3], [14], [25]. Even though it is an appropriate technique [16] in case of traditionally compiled machine code, the most difficult problem it faces is difficulty to handle obfuscated binaries [28].…”
Section: Malware Detection Techniques -An Overviewmentioning
confidence: 99%
“…Network anomaly detection is becoming an essential area of research. The growing number of IP networks threats and the growing volume of transmitted data require new methods of network traffic data analysis [8], [13]. For the purpose of this work, a part of the university network was selected to capture data for analysis.…”
Section: Usability Studiesmentioning
confidence: 99%