2015
DOI: 10.3390/e17096239
|View full text |Cite
|
Sign up to set email alerts
|

Using Generalized Entropies and OC-SVM with Mahalanobis Kernel for Detection and Classification of Anomalies in Network Traffic

Abstract: Network anomaly detection and classification is an important open issue in network security. Several approaches and systems based on different mathematical tools have been studied and developed, among them, the Anomaly-Network Intrusion Detection System (A-NIDS), which monitors network traffic and compares it against an established baseline of a "normal" traffic profile. Then, it is necessary to characterize the "normal" Internet traffic. This paper presents an approach for anomaly detection and classification… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
12
0

Year Published

2015
2015
2021
2021

Publication Types

Select...
6
1

Relationship

1
6

Authors

Journals

citations
Cited by 11 publications
(12 citation statements)
references
References 25 publications
0
12
0
Order By: Relevance
“…The window sizes most commonly used are: 5 min [15,16,[23][24][25], 30 min, 1 min, 100 sec, 5 sec and 0.5 sec. Some researchers use windows with a fixed length L = 4096 [19], 1000 [26], and 32 [4] packets. Therefore, the main objective of windowing is to reduce the data volume.…”
Section: Windowing In Network Trafficmentioning
confidence: 99%
See 2 more Smart Citations
“…The window sizes most commonly used are: 5 min [15,16,[23][24][25], 30 min, 1 min, 100 sec, 5 sec and 0.5 sec. Some researchers use windows with a fixed length L = 4096 [19], 1000 [26], and 32 [4] packets. Therefore, the main objective of windowing is to reduce the data volume.…”
Section: Windowing In Network Trafficmentioning
confidence: 99%
“…Santiago-Paz et al (2014) [19] present the Entropy and Mahalanobis Distance (EMD) based Algorithm to define elliptical regions in the feature space. In [4], OC-SVM and k-temporal nearest neighbors are used to improve accuracy in classification.…”
Section: Classificationmentioning
confidence: 99%
See 1 more Smart Citation
“…Model selection is to seek proper values of hyper-parameters commonly by means of cross-validation and grid search [32]. The k-fold cross-validation [12,13] partitions the training data into k disjoint subsets of approximately equal size. A series of k models are then trained, each using a different combination of k´1 subsets.…”
Section: Kernel Function and Model Selectionmentioning
confidence: 99%
“…Recently, kernel methods have been identified as one of the leading means for pattern classification and function approximation, and successfully applied in various fields [8][9][10][11][12][13][14]. Support vector machine (SVM), initially developed by Vapnik for pattern classification, is one of the most used models.…”
Section: Introductionmentioning
confidence: 99%