Proceedings of the 7th International Conference on Information Systems Security and Privacy 2021
DOI: 10.5220/0010233404500457
|View full text |Cite
|
Sign up to set email alerts
|

Two Stage Anomaly Detection for Network Intrusion Detection

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
3
3
1

Relationship

1
6

Authors

Journals

citations
Cited by 11 publications
(7 citation statements)
references
References 0 publications
0
7
0
Order By: Relevance
“…Due to such reasons, implementing a general defence approach or application for APT attacks proves to be very difficult, even unlikely. Therefore, this work contributes to this challenge by evaluating the multi-stage approach from [14] for anomaly detection. In this way, our proposed approach contributes to the above-mentioned challenges with the goal to make anomaly-detection findings more understandable.…”
Section: Related Workmentioning
confidence: 99%
See 3 more Smart Citations
“…Due to such reasons, implementing a general defence approach or application for APT attacks proves to be very difficult, even unlikely. Therefore, this work contributes to this challenge by evaluating the multi-stage approach from [14] for anomaly detection. In this way, our proposed approach contributes to the above-mentioned challenges with the goal to make anomaly-detection findings more understandable.…”
Section: Related Workmentioning
confidence: 99%
“…In addition, the test dataset is further used for the additional testing of algorithms on previously unknown attack types. For the conducted tests, the following algorithms were applied: This two-stage approach, as presented in the previous work in [14], combines both models, which underlying idea is depicted in Figure 3. In a first step-referred to as the pre-processing or filtering step-a fast anomaly detector filters out data which, with a very high probability, does not belong to any anomaly.…”
Section: Anomaly Detection With Autoencodersmentioning
confidence: 99%
See 2 more Smart Citations
“…Authors in [14] used a novel method that combines isolation forest and One Class Support Vector Machine (OCSVM) with an active learning method to detect attacks with no prior information. Authors in [15] used a two-stage approach combining a fast preprocessing or filtering method with a variation auto encoder using reconstruction probability. Authors in [16] performed a Distributed Denial of Service (DDoS) attack using the ping of death technique and detected it using RF algorithm by using the WEKA tool with classification accuracy of 99.76%.…”
Section: Related Workmentioning
confidence: 99%