A comprehensive survey on network anomaly detection

G Fernandes, JJPC Rodrigues, LF Carvalho… - Telecommunication …, 2019 - Springer
Nowadays, there is a huge and growing concern about security in information and
communication technology among the scientific community because any attack or anomaly …

A holistic review of network anomaly detection systems: A comprehensive survey

N Moustafa, J Hu, J Slay - Journal of Network and Computer Applications, 2019 - Elsevier
Abstract Network Anomaly Detection Systems (NADSs) are gaining a more important role in
most network defense systems for detecting and preventing potential threats. The paper …

Dos and don'ts of machine learning in computer security

D Arp, E Quiring, F Pendlebury, A Warnecke… - 31st USENIX Security …, 2022 - usenix.org
With the growing processing power of computing systems and the increasing availability of
massive datasets, machine learning algorithms have led to major breakthroughs in many …

In-vehicle network intrusion detection using deep convolutional neural network

HM Song, J Woo, HK Kim - Vehicular Communications, 2020 - Elsevier
The implementation of electronics in modern vehicles has resulted in an increase in attacks
targeting in-vehicle networks; thus, attack detection models have caught the attention of the …

Kitsune: an ensemble of autoencoders for online network intrusion detection

Y Mirsky, T Doitshman, Y Elovici, A Shabtai - arxiv preprint arxiv …, 2018 - arxiv.org
Neural networks have become an increasingly popular solution for network intrusion
detection systems (NIDS). Their capability of learning complex patterns and behaviors make …

Intrusion detection for IoT based on improved genetic algorithm and deep belief network

Y Zhang, P Li, X Wang - IEEE Access, 2019 - ieeexplore.ieee.org
With the advent of the Internet of Things (IoT), the security of the network layer in the IoT is
getting more and more attention. The traditional intrusion detection technologies cannot be …

An explainable machine learning framework for intrusion detection systems

M Wang, K Zheng, Y Yang, X Wang - IEEE Access, 2020 - ieeexplore.ieee.org
In recent years, machine learning-based intrusion detection systems (IDSs) have proven to
be effective; especially, deep neural networks improve the detection rates of intrusion …

A survey of distributed denial-of-service attack, prevention, and mitigation techniques

T Mahjabin, Y **ao, G Sun… - International Journal of …, 2017 - journals.sagepub.com
Distributed denial-of-service is one kind of the most highlighted and most important attacks
of today's cyberworld. With simple but extremely powerful attack mechanisms, it introduces …

Survey on anomaly detection using data mining techniques

S Agrawal, J Agrawal - Procedia Computer Science, 2015 - Elsevier
In the present world huge amounts of data are stored and transferred from one location to
another. The data when transferred or stored is primed exposed to attack. Although various …

[KIRJA][B] An introduction to outlier analysis

CC Aggarwal, CC Aggarwal - 2017 - Springer
Outliers are also referred to as abnormalities, discordants, deviants, or anomalies in the data
mining and statistics literature. In most applications, the data is created by one or more …