A comprehensive survey of anomaly detection techniques for high dimensional big data
Anomaly detection in high dimensional data is becoming a fundamental research problem
that has various applications in the real world. However, many existing anomaly detection …
that has various applications in the real world. However, many existing anomaly detection …
Real-time big data processing for anomaly detection: A survey
The advent of connected devices and omnipresence of Internet have paved way for
intruders to attack networks, which leads to cyber-attack, financial loss, information theft in …
intruders to attack networks, which leads to cyber-attack, financial loss, information theft in …
Does big data enhance firm innovation competency? The mediating role of data-driven insights
Grounded in gestalt insight learning theory and organizational learning theory, we collected
data from 280 middle and top-level managers to investigate the impact of each big data …
data from 280 middle and top-level managers to investigate the impact of each big data …
Novel geometric area analysis technique for anomaly detection using trapezoidal area estimation on large-scale networks
The prevalence of interconnected appliances and ubiquitous computing face serious threats
from the hostile activities of network attackers. Conventional Intrusion Detection Systems …
from the hostile activities of network attackers. Conventional Intrusion Detection Systems …
Towards a reliable comparison and evaluation of network intrusion detection systems based on machine learning approaches
Presently, we are living in a hyper-connected world where millions of heterogeneous
devices are continuously sharing information in different application contexts for wellness …
devices are continuously sharing information in different application contexts for wellness …
Big data analytics for network anomaly detection from netflow data
Cyber-attacks was organized in a simple and random way in the past. However attacks are
carried out systematically and long term nowadays. In addition, the high calculation volume …
carried out systematically and long term nowadays. In addition, the high calculation volume …
PCA-based multivariate statistical network monitoring for anomaly detection
The multivariate approach based on Principal Component Analysis (PCA) for anomaly
detection received a lot of attention from the networking community one decade ago, mainly …
detection received a lot of attention from the networking community one decade ago, mainly …
Big data analysis and distributed deep learning for next-generation intrusion detection system optimization
With the growing use of information technology in all life domains, hacking has become
more negatively effective than ever before. Also with develo** technologies, attacks …
more negatively effective than ever before. Also with develo** technologies, attacks …
Present and future of network security monitoring
Network Security Monitoring (NSM) is a popular term to refer to the detection of security
incidents by monitoring the network events. An NSM system is central for the security of …
incidents by monitoring the network events. An NSM system is central for the security of …
Semi-supervised multivariate statistical network monitoring for learning security threats
This paper presents a semi-supervised approach for intrusion detection. The method
extends the unsupervised multivariate statistical network monitoring approach based on the …
extends the unsupervised multivariate statistical network monitoring approach based on the …