2017 International Conference on Electrical, Electronics, Communication, Computer, and Optimization Techniques (ICEECCOT) 2017
DOI: 10.1109/iceeccot.2017.8284655
|View full text |Cite
|
Sign up to set email alerts
|

Review on anomaly based network intrusion detection system

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
47
0

Year Published

2019
2019
2021
2021

Publication Types

Select...
5
5

Relationship

0
10

Authors

Journals

citations
Cited by 105 publications
(47 citation statements)
references
References 33 publications
0
47
0
Order By: Relevance
“…Anomaly-based detection technique utilizes the normal operational profiles of the system to detect malicious activities or events. Machine learning techniques were considered as the most innovative method in anomaly detection [18]. Efstathopolous et al [13] presented a comparative analysis of a supervised machine learning algorithm that includes One Class-SVM, Isolation Forest, Angle-Base Outlier (ABOD).…”
Section: Related Workmentioning
confidence: 99%
“…Anomaly-based detection technique utilizes the normal operational profiles of the system to detect malicious activities or events. Machine learning techniques were considered as the most innovative method in anomaly detection [18]. Efstathopolous et al [13] presented a comparative analysis of a supervised machine learning algorithm that includes One Class-SVM, Isolation Forest, Angle-Base Outlier (ABOD).…”
Section: Related Workmentioning
confidence: 99%
“…Standalone data analytics and machine learning methods are often combined into more advanced hybrid approaches, combining various methods including the use of hierarchical and layered models [4][5][6][7] and anomaly detection models [8,9] or enhancing the machine learning models with knowledge-based approaches [10,11]. The overall motivation of those approaches is usually aimed to provide the capability of detection of rare attacks without sacrificing the detection accuracy of the frequent ones and, on the other hand, minimizing the false alarm rate in such attacks.…”
Section: Related Workmentioning
confidence: 99%
“…In computer network security, identifying the intrusion attacks is the most challenging issues. The methods of anomaly detection include predictive pattern generation, neural network, sequence matching, statistics and supervising [1]. IDS are becoming the main part for many organizations after deploying firewall technology at the network perimeter.…”
Section: Literature Surveymentioning
confidence: 99%