-
1
Packet header anomaly detection using statistical analysis
Published 2014“…The disclosure of network packets to recurrent cyber intrusion has upraised the essential for modelling various statistical-based anomaly detection methods lately. Theoretically, the statistical-based anomaly detection method fascinates researcher’s attentiveness, but technologically, the fewer intrusion detection rates persist as vulnerable disputes. …”
Conference or Workshop Item -
2
A refined filter for UHAD to improve anomaly detection
Published 2016“…Therefore, this paper proposes a refined filterer for unsupervised heterogeneous anomaly detection that retains most anomalous events irrespective of its volume in the logs and also discusses the impact of the refined filterer in supporting the detection. …”
Get full text
Article -
3
A comparison of different technique in flow based anomaly detection
Published 2017Subjects: “…Anomaly detection (Computer security)…”
Get full text
Thesis -
4
Host-based packet header anomaly detection using statistical analysis
Published 2013“…The exposure of network packets to frequent cyber attacks has increased the need for designing statistical-based anomaly detection recently. Conceptually, the statistical based anomaly detection attracts researcher's attention, but technically, the low attack detection rates remains an open challenges. …”
Get full text
Conference or Workshop Item -
5
Effective dimensionality reduction of payload-based anomaly detection in TMAD model for HTTP payload
Published 2016“…Our proposed anomaly detection also achieved comparable performance in terms of computational complexity when compared to three state-of-the-art anomaly detection systems.…”
Get full text
Article -
6
A survey of anomaly detection using data mining methods for hypertext transfer protocol web services
Published 2015“…Data mining is widely recognized as popular and important intelligent and automatic tools to assist humans in big data security analysis and anomaly detection over IDSs. In this study we discuss our review in data mining anomaly detection methods for HTTP web services. …”
Get full text
Article -
7
-
8
Improved TLS protocol for platform integrity assurance using mutual attestation
Published 2014Subjects: Get full text
Thesis -
9
Permission extraction framework for android malware detection
Published 2019Subjects: Get full text
Thesis -
10
An efficient anomaly intrusion detection method with evolutionary neural network
Published 2020“…Despite all the strengths of the anomaly detection systems, there are still drawbacks that reduce the performance of the system. …”
Get full text
Thesis -
11
An integrated anomaly intrusion detection scheme using statistical, hybridized classifiers and signature approach
Published 2015“…In recent years, data mining based anomaly detection (DMAD), particularly classification methods, have been incessantly enhanced in differentiating normal and attack behaviour. …”
Get full text
Thesis -
12
Intrusion detection based on K-means clustering and Naïve Bayes classification
Published 2011“…Intrusion Detection System (IDS) plays an effective way to achieve higher security in detecting malicious activities for a couple of years. Anomaly detection is one of intrusion detection system. …”
Get full text
Conference or Workshop Item -
13
Signature-based anomaly intrusion detection using integrated data mining classifiers
Published 2014“…In this work, a novel Signature-Based Anomaly Detection Scheme (SADS) which could be applied to scrutinize packet headers' behaviour patterns more precisely and promptly is proposed. …”
Get full text
Conference or Workshop Item -
14
An overview of neural networks use in anomaly intrusion detection systems
Published 2009“…But the main problem of anomaly detection IDS is that; it is very difficult to build, because of the difficulty in defining what is normal and what is abnormal. …”
Get full text
Conference or Workshop Item -
15
An efficient anomaly intrusion detection method with evolutionary kernel neural network random weights
Published 2020“…Considering that using a combination of ANN and EA can produce an advanced technique to develop an efficient anomaly detection approach for IDS, several types of research have used ENN algorithms to detect the attacks. …”
Get full text
Article -
16
A proposed approach for diabetes diagnosis using neuro-fuzzy technique
Published 2022“…Normalization, imputation, and anomaly detection are part of the pre-processing stage. …”
Article -
17
Improving intrusion detection using genetic algorithm
Published 2013“…A great deal of attention has been recently paid to anomaly detection to accomplish intrusion detection. However, a major problem with this approach is maximizing detection rate and accuracy, as well as minimizing false alarm i.e., inability to correctly discover particular types of attacks. …”
Get full text
Article -
18
A systematic literature review on outlier detection in wireless sensor networks
Published 2020“…The purpose of this paper is to conduct a systematic literature review to report the available works on outlier and anomaly detection in WSNs. The paper highlights works conducted from January 2004 to October 2018. …”
Get full text
Article -
19
Anomaly behavior detection using flexible packet filtering and support vector machine algorithms
Published 2016“…The main method is related to processing and filtering data packets using different types of packet filtering on network system and, more specifically, capturing and filtering data packets transmitted on high speed communications links for errors and attackers’ detection and signal integrity analysis. Many anomaly detection experiments have been conducted in order to investigate the performance of network traffics filtering methods that analyzing bandwidth, speed, errors and attackers. …”
Get full text
Thesis -
20
Statistical global investigation of pre-earthquake anomalous geomagnetic diurnal variation using superposed epoch analysis
Published 2022“…However, the statistical significance of such anomalies detected using the diurnal variation range ratio (DVRR) method still requires verification as only a limited number of EQs occurring in certain seismoactive zones were included. …”
Article