COMPARATIVE ANALYSIS OF ANOMALLY DETECTION ALGORITHMS

作者: Patrick Kabue

DOI:

关键词:

摘要:

参考文章(17)
Levent Ertöz, Aleksandar Lazarevic, Vipin Kumar, Jaideep Srivastava, Aysel Ozgur, A Comparative Study of Anomaly Detection Schemes in Network Intrusion Detection. siam international conference on data mining. pp. 25- 36 ,(2003)
K. M. C. Tan, R. A. Maxion, Performance Evaluation of Anomaly-Based Detection Mechanisms School of Computing Science Technical Report Series. ,(2004)
Vinod Yegneswaran, Guofei Gu, Wenke Lee, Martin Fong, Phillip Porras, BotHunter: detecting malware infection through IDS-driven dialog correlation usenix security symposium. pp. 12- ,(2007)
Daniela Brauckhoff, Network traffic anomaly detection and evaluation TIK-Schriftenreihe. ,vol. 113, ,(2010) , 10.3929/ETHZ-A-006032727
Hong Huang, Hajar Brani, Hussein Al-Azzawi, Network Traffic Anomaly Detection. arXiv: Cryptography and Security. ,(2014)
Khadija Houerbi Ramah, Hichem Ayari, Farouk Kamoun, Traffic Anomaly Detection and Characterization in the Tunisian National University Network NETWORKING 2006. Networking Technologies, Services, and Protocols; Performance of Computer and Communication Networks; Mobile and Wireless Communications Systems. pp. 136- 147 ,(2006) , 10.1007/11753810_12
Leyla Bilge, Tudor Dumitras, Before we knew it Proceedings of the 2012 ACM conference on Computer and communications security - CCS '12. pp. 833- 844 ,(2012) , 10.1145/2382196.2382284
Ciza Thomas, Vishwas Sharma, N. Balakrishnan, Usefulness of DARPA dataset for intrusion detection system evaluation Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2008. ,vol. 6973, ,(2008) , 10.1117/12.777341
Andrew McCallum, Don Towsley, Yu Gu, Detecting anomalies in network traffic using maximum entropy estimation internet measurement conference. pp. 32- 32 ,(2005) , 10.5555/1251086.1251118
Matthew V. Mahoney, Philip K. Chan, Learning nonstationary models of normal network traffic for detecting novel attacks Proceedings of the eighth ACM SIGKDD international conference on Knowledge discovery and data mining - KDD '02. pp. 376- 385 ,(2002) , 10.1145/775047.775102