Anomaly Detection in Computer Networks: A State-of-the-Art Review.

作者: Sherenaz W. Al-Haj Baddar , Alessio Merlo , Mauro Migliardi

DOI:

关键词: Root causeAnomaly (physics)Computer scienceNetwork levelState of the art reviewAnomaly detectionComponent (UML)Computer network

摘要: The ever-lasting challenge of detecting and mitigating failures in computer networks has become more essential than ever; especially with the enormous number smart devices that get connected to all sorts network everyday. Whether root cause a given anomaly is security breach, component failure, an environmental factor, or even any combination these reasons, anomalies need be detected mitigated timely properly. In this paper, we review evaluate state-of-the-art studies on problem detection networks. We provide elaborate description problem, depict different categorizations its solutions. also illustrate some recent solutions level, current trends handling malware-induced smartphone Additionally, presented highlight their shortcomings.

参考文章(127)
Isabelle Guyon, André Elisseeff, An introduction to variable and feature selection Journal of Machine Learning Research. ,vol. 3, pp. 1157- 1182 ,(2003) , 10.1162/153244303322753616
Abhishek Karnik, Suchandra Goswami, Ratan Guha, Detecting Obfuscated Viruses Using Cosine Similarity Analysis asia international conference on modelling and simulation. pp. 165- 170 ,(2007) , 10.1109/AMS.2007.31
Brian Kulis, Metric Learning: A Survey ,(2013)
Varun Chandola, Arindam Banerjee, Vipin Kumar, Anomaly detection: A survey ACM Computing Surveys. ,vol. 41, pp. 15- ,(2009) , 10.1145/1541880.1541882
Daniel Arp, Michael Spreitzenbarth, Malte Hubner, Hugo Gascon, Konrad Rieck, CERT Siemens, DREBIN: Effective and Explainable Detection of Android Malware in Your Pocket. network and distributed system security symposium. ,(2014) , 10.14722/NDSS.2014.23247
Osman Salem, Alexey Guerassimov, Ahmed Mehaoua, Anthony Marcus, Borko Furht, Sensor fault and patient anomaly detection and classification in medical wireless sensor networks 2013 IEEE International Conference on Communications (ICC). pp. 4373- 4378 ,(2013) , 10.1109/ICC.2013.6655254
Yajin Zhou, Xuxian Jiang, Dissecting Android Malware: Characterization and Evolution ieee symposium on security and privacy. pp. 95- 109 ,(2012) , 10.1109/SP.2012.16
B.W. Silverman, Density estimation for statistics and data analysis Monographs on Statistics and Applied Probability. ,(1986) , 10.1201/9781315140919
G. Cormode, S. Muthukrishnan, What's new: finding significant differences in network data streams international conference on computer communications. ,vol. 3, pp. 1534- 1545 ,(2004) , 10.1109/INFCOM.2004.1354567
Vojislav Kecman, J. Paul Brooks, Locally linear support vector machines and other local models international joint conference on neural network. pp. 1- 6 ,(2010) , 10.1109/IJCNN.2010.5596922