Proceedings of the 34th ACM/SIGAPP Symposium on Applied Computing 2019
DOI: 10.1145/3297280.3297314
|View full text |Cite
|
Sign up to set email alerts
|

Quantitative comparison of unsupervised anomaly detection algorithms for intrusion detection

Abstract: Anomaly detection algorithms aim at identifying unexpected fluctuations in the expected behavior of target indicators, and, when applied to intrusion detection, suspect attacks whenever the above deviations are observed. Through years, several of such algorithms have been proposed, evaluated experimentally, and analyzed in qualitative and quantitative surveys. However, the experimental comparison of a comprehensive set of algorithms for anomaly-based intrusion detection against a comprehensive set of attacks d… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
31
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
3
3
3
1

Relationship

1
9

Authors

Journals

citations
Cited by 43 publications
(31 citation statements)
references
References 39 publications
0
31
0
Order By: Relevance
“…k th NN assigns anomaly score of an instance by computing the distance to its k th -nearest-neighbor, whereas kNN takes the average distance over all k-nearest-neighbors. Both methods are shown to have competitive performance in various comparative studies [16,17,12,18]. In particular, the comparative study developed by Goldstein and Uchida [16] is the one of most comprehensive analysis to date that includes the discussion of NN-methods and, at the same time, aligns with the unsupervised anomaly detection setup.…”
Section: Empirical Performance Of Nn-methodsmentioning
confidence: 99%
“…k th NN assigns anomaly score of an instance by computing the distance to its k th -nearest-neighbor, whereas kNN takes the average distance over all k-nearest-neighbors. Both methods are shown to have competitive performance in various comparative studies [16,17,12,18]. In particular, the comparative study developed by Goldstein and Uchida [16] is the one of most comprehensive analysis to date that includes the discussion of NN-methods and, at the same time, aligns with the unsupervised anomaly detection setup.…”
Section: Empirical Performance Of Nn-methodsmentioning
confidence: 99%
“…The proposed anomaly detection approach supports anomaly detection in ongoing streaming sessions as it recalculates the probability for a specific session to be anomalous for each new streaming control event that is received. Falcão et al (2019) they evaluate experimentally a pool of twelve unsupervised anomaly detection algorithms on five attacks datasets. Results allow elaborating on a wide range of arguments, from the behavior of the individual algorithm to the suitability of the datasets to anomaly detection.…”
Section: Related Workmentioning
confidence: 99%
“…The authors Filipe Falcão, et.al., [6] they evaluate experimentally a pool of twelve unsupervised anomaly detection algorithms on ve attacks datasets. Results allow elaborating on a wide range of arguments, from the behavior of the individual algorithm to the suitability of the datasets to anomaly detection.…”
Section: Tp-true Positive Fp-false Positive Fn-false Negative Tn-tmentioning
confidence: 99%