-
1
Packet header anomaly detection using statistical analysis
Published 2014“…The disclosure of network packets to recurrent cyber intrusion has upraised the essential for modelling various statistical-based anomaly detection methods lately. Theoretically, the statistical-based anomaly detection method fascinates researcher’s attentiveness, but technologically, the fewer intrusion detection rates persist as vulnerable disputes. …”
Conference or Workshop Item -
2
Unsupervised Anomaly Detection with Unlabeled Data Using Clustering
Published 2005“…We present a clustering-based intrusion detection algorithm, unsupervised anomaly detection, which trains on unlabeled data in order to detect new intrusions. …”
Get full text
Conference or Workshop Item -
3
Integrating genetic algorithms and fuzzy c-means for anomaly detection
Published 2005“…The amount of available network audit data instances is usually large; human labeling is tedious, time-consuming, and expensive. Traditional anomaly detection algorithms require a set of purely normal data from which they train their model. …”
Get full text
Conference or Workshop Item -
4
To identify suspicious activity in anomaly detection based on soft computing
Published 2006“…Empirical studies using the network security data set from the DARPA 1998 offline intrusion detection project (KDD 1999 Cup) show the feasibility of misuse and anomaly detection results.…”
Conference or Workshop Item -
5
Anomaly detection through spatio-temporal context modeling in crowded scenes
Published 2014“…The proposed framework essentially turns the anomaly detection process into two parts, namely, motion pattern representation and crowded context modeling. …”
Get full text
Conference or Workshop Item -
6
Host-based packet header anomaly detection using statistical analysis
Published 2013“…The exposure of network packets to frequent cyber attacks has increased the need for designing statistical-based anomaly detection recently. Conceptually, the statistical based anomaly detection attracts researcher's attention, but technically, the low attack detection rates remains an open challenges. …”
Get full text
Conference or Workshop Item -
7
Real valued negative selection for anomaly detection in wireless ad hoc networks
Published 2004“…To achieve our goal, we studied how the real-valued negative selection algorithm can be applied in wireless ad hoc network network and finally we proposed the enhancements to real-valued negative selection algorithm for anomaly detection in wireless ad hoc network.…”
Get full text
Conference or Workshop Item -
8
Improving the anomaly detection by combining PSO search methods and J48 algorithm
Published 2020“…Compared with the previous study the proposed technique has better accuracy, TPR, and FPR.Anomaly Detection, CICIDS2017…”
Conference or Workshop Item -
9
A feature selection algorithm for anomaly detection in grid environment using k-fold cross validation technique
Published 2017Conference or Workshop Item -
10
Campus hybrid intrusion detection system using SNORT and C4.5 Algorithm
Published 2020“…In this paper, the authors built Hybrid Intrusion Detecting System combines misuse detection system with anomaly detection system. The basis of misused detection module is snort, and anomaly detection module is constructed by using Algorithm C4.5 detectors. …”
Get full text
Get full text
Conference or Workshop Item -
11
Intrusion detection based on K-means clustering and Naïve Bayes classification
Published 2011“…Intrusion Detection System (IDS) plays an effective way to achieve higher security in detecting malicious activities for a couple of years. Anomaly detection is one of intrusion detection system. …”
Get full text
Conference or Workshop Item -
12
An FPGA-based IP core subscription-oriented fog computing platform
Published 2022“…The throughput and latency of implemented FPGA-based time-series anomaly detection analytics are 3096 detections per second and 0.32 ms, respectively, which is more than 61 × speedup over the reference analytics implemented in software. …”
Conference or Workshop Item -
13
Anomaly intrusion detection model using data mining techniques
Published 2006“…Evaluations are done using unsupervised anomaly detection schemes on the DARPA’98 data sets and real network traffic. …”
Conference or Workshop Item -
14
Signature-based anomaly intrusion detection using integrated data mining classifiers
Published 2014“…In this work, a novel Signature-Based Anomaly Detection Scheme (SADS) which could be applied to scrutinize packet headers' behaviour patterns more precisely and promptly is proposed. …”
Get full text
Conference or Workshop Item -
15
Fast optimization method: an on-line hurst parameter estimator
Published 2007“…The on-line Hurst estimator is crucial to characterize self-similar feature on stochastic process and widely applied in various fields such as in network traffic analysis, bandwidth provisioning and anomaly detection. Recent on-line Hurst estimator based on fast wavelet transform known as real-time wavelet estimator (RWM) is proven can estimates faster than other methods in on-line fashion. …”
Conference or Workshop Item -
16
Stepping-stone detection technique for recognizing legitimate and attack connections
Published 2015“…However, not all stepping-stone connections are malicious.This paper proposes an enhanced stepping-stone detection (SSD) technique which is capable to identify legitimate connections from stepping-stone connections.Stepping-stone connections are identified from raw network traffics using timing-based SSD approach.Then, they go through an anomaly detection technique to differentiate between legitimate and attack connections.This technique has a promising solution to accurately detecting intrusions from stepping-stone connections.It will prevent incorrect responses that punish legitimate users.…”
Get full text
Conference or Workshop Item -
17
Review of firewall optimization techniques
Published 2018“…This paper review firewall optimization techniques such as data mining, anomaly detection, and traffic awareness, that have been done throughout time. …”
Get full text
Conference or Workshop Item -
18
Thermal Condition Monitoring of Electrical Installations Based on Infrared Image Analysis
Published 2013“…Therefore, this paper proposed a fast thermal anomaly detection and classification based on qualitative infrared image analysis. …”
Get full text
Conference or Workshop Item -
19
An overview of neural networks use in anomaly intrusion detection systems
Published 2009“…But the main problem of anomaly detection IDS is that; it is very difficult to build, because of the difficulty in defining what is normal and what is abnormal. …”
Get full text
Conference or Workshop Item -
20
Anomaly intrusion detection systems in IoT using deep learning techniques: a survey
Published 2021“…Consequently, improving the performance of anomaly detection requires the use of advanced deep learning techniques instead of traditional shallow learning approaches. …”
Conference or Workshop Item