Network anomaly detection: methods, systems and tools

MH Bhuyan, DK Bhattacharyya… - … surveys & tutorials, 2013 - ieeexplore.ieee.org
Network anomaly detection is an important and dynamic research area. Many network
intrusion detection methods and systems (NIDS) have been proposed in the literature. In this …

Anomaly‐based intrusion detection systems: The requirements, methods, measurements, and datasets

S Hajj, R El Sibai, J Bou Abdo… - Transactions on …, 2021 - Wiley Online Library
With the Internet's unprecedented growth and nations' reliance on computer networks, new
cyber‐attacks are created every day as means for achieving financial gain, imposing …

An accurate security game for low-resource IoT devices

H Sedjelmaci, SM Senouci… - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
The Internet of Things (IoT) technology incorporates a large number of heterogeneous
devices connected to untrusted networks. Nevertheless, securing IoT devices is a …

Designing an online and reliable statistical anomaly detection framework for dealing with large high-speed network traffic

N Moustafa - 2017 - unsworks.unsw.edu.au
Abstract Despite a Network Anomaly Detection System (NADS) being capable of detecting
existing and zero-day attacks, it is still not universally implemented in industry and real …

idMAS-SQL: intrusion detection based on MAS to detect and block SQL injection through data mining

CI Pinzon, JF De Paz, A Herrero, E Corchado, J Bajo… - Information …, 2013 - Elsevier
This study presents a multiagent architecture aimed at detecting SQL injection attacks, which
are one of the most prevalent threats for modern databases. The proposed architecture is …

Beta hebbian learning as a new method for exploratory projection pursuit

H Quintián, E Corchado - International journal of neural systems, 2017 - World Scientific
In this research, a novel family of learning rules called Beta Hebbian Learning (BHL) is
thoroughly investigated to extract information from high-dimensional datasets by projecting …

[PDF][PDF] An empirical study of intrusion detection system using feature reduction based on evolutionary algorithms and swarm intelligence methods

R Dubey, D Rathore, D Kushwaha… - International Journal of …, 2017 - researchgate.net
The use of computer more and more need to be increase the security day by day in a real
world, the process of monitoring the computer system in a secure way for an unknown and …

[PDF][PDF] Real-time intrusion detection system using multi-agent system

WL Al-Yaseen, ZA Othman… - … International Journal of …, 2016 - researchgate.net
The growth of network attacks has lengthened the intrusion detection system's (IDS)
processing time to detect these attacks. The demand for reducing the processing time has …

[PDF][PDF] Adaptive hybrid model for network intrusion detection and comparison among machine learning algorithms

ME Haque, TM Alkharobi - International Journal of Machine Learning and …, 2015 - ijml.org
In this paper, we propose a novel method using ensemble learning scheme for classifying
network intrusion detection from the most renowned KDD cup dataset. We have shown that …

Network traffic anomaly detection techniques and systems

MH Bhuyan, DK Bhattacharyya, JK Kalita… - Network Traffic Anomaly …, 2017 - Springer
To develop a network traffic anomaly detection technique and system, it is indeed necessary
to know the basic properties of network-wide traffic. This chapter starts with a discussion of …