A comprehensive survey on network anomaly detection
Nowadays, there is a huge and growing concern about security in information and
communication technology among the scientific community because any attack or anomaly …
communication technology among the scientific community because any attack or anomaly …
Network anomaly detection system using genetic algorithm and fuzzy logic
Due to the sheer number of applications that uses computer networks, in which some are
crucial to users and enterprises, network management is essential. Therefore, integrity and …
crucial to users and enterprises, network management is essential. Therefore, integrity and …
A novel model for anomaly detection in network traffic based on kernel support vector machine
Q Ma, C Sun, B Cui, X ** - Computers & Security, 2021 - Elsevier
Abstract Machine learning models are widely used for anomaly detection in network traffic.
Effective transformation of the raw traffic data into mathematical expressions and hyper …
Effective transformation of the raw traffic data into mathematical expressions and hyper …
On distributed denial of service current defense schemes
Distributed denial of service (DDoS) attacks are a major threat to any network-based service
provider. The ability of an attacker to harness the power of a lot of compromised devices to …
provider. The ability of an attacker to harness the power of a lot of compromised devices to …
A game theoretical based system using holt-winters and genetic algorithm with fuzzy logic for DoS/DDoS mitigation on SDN networks
The ever expanding the usage of cloud computing environments, connected applications
and Internet of Things-based devices have progressively increased the amount of data that …
and Internet of Things-based devices have progressively increased the amount of data that …
Network anomaly detection using IP flows with principal component analysis and ant colony optimization
It is remarkable how proactive network management is in such demand nowadays, since
networks are growing in size and complexity and Information Technology services cannot be …
networks are growing in size and complexity and Information Technology services cannot be …
Autonomous profile-based anomaly detection system using principal component analysis and flow analysis
Different techniques and methods have been widely used in the subject of automatic
anomaly detection in computer networks. Attacks, problems and internal failures when not …
anomaly detection in computer networks. Attacks, problems and internal failures when not …
An unsupervised anomaly detection approach using energy-based spatiotemporal graphical modeling
This paper presents a new data-driven framework for unsupervised system-wide anomaly
detection for modern distributed complex systems within which there exists a strong …
detection for modern distributed complex systems within which there exists a strong …
Deep IP flow inspection to detect beyond network anomalies
Taking into account the accelerated rate of network growth, the occurrence of anomalies
becomes inevitable. A single anomaly can affect the network performance so it is crucial to …
becomes inevitable. A single anomaly can affect the network performance so it is crucial to …
Anomaly detection using the correlational paraconsistent machine with digital signatures of network segment
This study presents the correlational paraconsistent machine (CPM), a tool for anomaly
detection that incorporates unsupervised models for traffic characterization and principles of …
detection that incorporates unsupervised models for traffic characterization and principles of …