A comprehensive survey on network anomaly detection
Nowadays, there is a huge and growing concern about security in information and
communication technology among the scientific community because any attack or anomaly …
communication technology among the scientific community because any attack or anomaly …
A holistic review of network anomaly detection systems: A comprehensive survey
Abstract Network Anomaly Detection Systems (NADSs) are gaining a more important role in
most network defense systems for detecting and preventing potential threats. The paper …
most network defense systems for detecting and preventing potential threats. The paper …
Dos and don'ts of machine learning in computer security
With the growing processing power of computing systems and the increasing availability of
massive datasets, machine learning algorithms have led to major breakthroughs in many …
massive datasets, machine learning algorithms have led to major breakthroughs in many …
In-vehicle network intrusion detection using deep convolutional neural network
The implementation of electronics in modern vehicles has resulted in an increase in attacks
targeting in-vehicle networks; thus, attack detection models have caught the attention of the …
targeting in-vehicle networks; thus, attack detection models have caught the attention of the …
Kitsune: an ensemble of autoencoders for online network intrusion detection
Neural networks have become an increasingly popular solution for network intrusion
detection systems (NIDS). Their capability of learning complex patterns and behaviors make …
detection systems (NIDS). Their capability of learning complex patterns and behaviors make …
Intrusion detection for IoT based on improved genetic algorithm and deep belief network
With the advent of the Internet of Things (IoT), the security of the network layer in the IoT is
getting more and more attention. The traditional intrusion detection technologies cannot be …
getting more and more attention. The traditional intrusion detection technologies cannot be …
An explainable machine learning framework for intrusion detection systems
M Wang, K Zheng, Y Yang, X Wang - IEEE Access, 2020 - ieeexplore.ieee.org
In recent years, machine learning-based intrusion detection systems (IDSs) have proven to
be effective; especially, deep neural networks improve the detection rates of intrusion …
be effective; especially, deep neural networks improve the detection rates of intrusion …
A survey of distributed denial-of-service attack, prevention, and mitigation techniques
Distributed denial-of-service is one kind of the most highlighted and most important attacks
of today's cyberworld. With simple but extremely powerful attack mechanisms, it introduces …
of today's cyberworld. With simple but extremely powerful attack mechanisms, it introduces …
Survey on anomaly detection using data mining techniques
In the present world huge amounts of data are stored and transferred from one location to
another. The data when transferred or stored is primed exposed to attack. Although various …
another. The data when transferred or stored is primed exposed to attack. Although various …
[KIRJA][B] An introduction to outlier analysis
CC Aggarwal, CC Aggarwal - 2017 - Springer
Outliers are also referred to as abnormalities, discordants, deviants, or anomalies in the data
mining and statistics literature. In most applications, the data is created by one or more …
mining and statistics literature. In most applications, the data is created by one or more …