A holistic review of Network Anomaly Detection Systems: A comprehensive survey

作者: Nour Moustafa , Jiankun Hu , Jill Slay

DOI: 10.1016/J.JNCA.2018.12.006

关键词:

摘要: Abstract Network Anomaly Detection Systems (NADSs) are gaining a more important role in most network defense systems for detecting and preventing potential threats. The paper discusses various aspects of anomaly-based Intrusion (NIDSs). explains cyber kill chain models cyber-attacks that compromise systems. Moreover, the describes Decision Engine (DE) approaches, including new ensemble learning deep approaches. also provides details about benchmark datasets training validating DE Most NADSs’ applications, such as Data Centers, Internet Things (IoT), well Fog Cloud Computing, discussed. Finally, we present several experimental explanations which follow by revealing promising research directions.

参考文章(135)
Prasanta Gogoi, Monowar H. Bhuyan, D. K. Bhattacharyya, J. K. Kalita, Packet and Flow Based Network Intrusion Dataset international conference on contemporary computing. pp. 322- 334 ,(2012) , 10.1007/978-3-642-32129-0_34
Alfonso Valdes, Phillip A. Porras, Live Traffic Analysis of TCP/IP Gateways. network and distributed system security symposium. ,(1998)
Xiaoping Shen, Sonali Agrawal, Kernel Density Estimation for An Anomaly Based Intrusion Detection System. MLMTA. pp. 161- 167 ,(2006)
Kriti Chadha, Sushma Jain, Hybrid Genetic Fuzzy Rule Based Inference Engine to Detect Intrusion in Networks Ingénierie Des Systèmes D'information. pp. 185- 198 ,(2015) , 10.1007/978-3-319-11227-5_17
Manish Kumar, M. Hanumanthappa, T. V. Suresh Kumar, Encrypted Traffic and IPsec Challenges for Intrusion Detection System Springer, New Delhi. pp. 721- 727 ,(2013) , 10.1007/978-81-322-0740-5_86
Hung-Jen Liao, Chun-Hung Richard Lin, Ying-Chih Lin, Kuang-Yuan Tung, Review: Intrusion detection system: A comprehensive review Journal of Network and Computer Applications. ,vol. 36, pp. 16- 24 ,(2013) , 10.1016/J.JNCA.2012.09.004
Daesung Moon, Sung Bum Pan, Ikkyun Kim, Host-based intrusion detection system for secure human-centric computing The Journal of Supercomputing. ,vol. 72, pp. 2520- 2536 ,(2016) , 10.1007/S11227-015-1506-9
Roni Bar - Yanai, Michael Langberg, David Peleg, Liam Roditty, Realtime classification for encrypted traffic symposium on experimental and efficient algorithms. pp. 373- 385 ,(2010) , 10.1007/978-3-642-13193-6_32
Satomi Honda, Yuki Unno, Koji Maruhashi, Masahiko Takenaka, Satoru Torii, TOPASE: Detection of brute force attacks used disciplined IPs from IDS log integrated network management. pp. 1361- 1364 ,(2015) , 10.1109/INM.2015.7140496