A comprehensive survey on network anomaly detection

G Fernandes, JJPC Rodrigues, LF Carvalho… - Telecommunication …, 2019 - Springer
Nowadays, there is a huge and growing concern about security in information and
communication technology among the scientific community because any attack or anomaly …

Network anomaly detection system using genetic algorithm and fuzzy logic

AH Hamamoto, LF Carvalho, LDH Sampaio… - Expert Systems with …, 2018 - Elsevier
Due to the sheer number of applications that uses computer networks, in which some are
crucial to users and enterprises, network management is essential. Therefore, integrity and …

A novel model for anomaly detection in network traffic based on kernel support vector machine

Q Ma, C Sun, B Cui, X ** - Computers & Security, 2021 - Elsevier
Abstract Machine learning models are widely used for anomaly detection in network traffic.
Effective transformation of the raw traffic data into mathematical expressions and hyper …

On distributed denial of service current defense schemes

SD Kotey, ET Tchao, JD Gadze - Technologies, 2019 - mdpi.com
Distributed denial of service (DDoS) attacks are a major threat to any network-based service
provider. The ability of an attacker to harness the power of a lot of compromised devices to …

A game theoretical based system using holt-winters and genetic algorithm with fuzzy logic for DoS/DDoS mitigation on SDN networks

MVO De Assis, AH Hamamoto, T Abrão… - IEEE …, 2017 - ieeexplore.ieee.org
The ever expanding the usage of cloud computing environments, connected applications
and Internet of Things-based devices have progressively increased the amount of data that …

Network anomaly detection using IP flows with principal component analysis and ant colony optimization

G Fernandes Jr, LF Carvalho, JJPC Rodrigues… - Journal of Network and …, 2016 - Elsevier
It is remarkable how proactive network management is in such demand nowadays, since
networks are growing in size and complexity and Information Technology services cannot be …

Autonomous profile-based anomaly detection system using principal component analysis and flow analysis

G Fernandes Jr, JJPC Rodrigues, ML Proenca Jr - Applied Soft Computing, 2015 - Elsevier
Different techniques and methods have been widely used in the subject of automatic
anomaly detection in computer networks. Attacks, problems and internal failures when not …

An unsupervised anomaly detection approach using energy-based spatiotemporal graphical modeling

C Liu, S Ghosal, Z Jiang, S Sarkar - Cyber-physical systems, 2017 - Taylor & Francis
This paper presents a new data-driven framework for unsupervised system-wide anomaly
detection for modern distributed complex systems within which there exists a strong …

Deep IP flow inspection to detect beyond network anomalies

AA Amaral, L de Souza Mendes, BB Zarpelão… - Computer …, 2017 - Elsevier
Taking into account the accelerated rate of network growth, the occurrence of anomalies
becomes inevitable. A single anomaly can affect the network performance so it is crucial to …

Anomaly detection using the correlational paraconsistent machine with digital signatures of network segment

EHM Pena, LF Carvalho, S Barbon Jr… - Information …, 2017 - Elsevier
This study presents the correlational paraconsistent machine (CPM), a tool for anomaly
detection that incorporates unsupervised models for traffic characterization and principles of …