Showing 1 - 20 results of 20 for search '"anomaly detection"', query time: 0.08s Refine Results
  1. 1

    Packet header anomaly detection using statistical analysis by Yassin, Warusia, Udzir, Nur Izura, Abdullah, Azizol, Abdullah @ Selimun, Mohd Taufik, Muda, Zaiton, Zulzalil, Hazura

    Published 2014
    “…The disclosure of network packets to recurrent cyber intrusion has upraised the essential for modelling various statistical-based anomaly detection methods lately. Theoretically, the statistical-based anomaly detection method fascinates researcher’s attentiveness, but technologically, the fewer intrusion detection rates persist as vulnerable disputes. …”
    Conference or Workshop Item
  2. 2

    A refined filter for UHAD to improve anomaly detection by Hajamydeen, Asif Iqbal, Udzir, Nur Izura

    Published 2016
    “…Therefore, this paper proposes a refined filterer for unsupervised heterogeneous anomaly detection that retains most anomalous events irrespective of its volume in the logs and also discusses the impact of the refined filterer in supporting the detection. …”
    Get full text
    Article
  3. 3

    A comparison of different technique in flow based anomaly detection by Salah, Mohammad

    Published 2017
    Subjects: “…Anomaly detection (Computer security)…”
    Get full text
    Thesis
  4. 4

    Host-based packet header anomaly detection using statistical analysis by Yassin, Warusia, Udzir, Nur Izura, Abdullah, Azizol, Abdullah @ Selimun, Mohd Taufik, Muda, Zaiton, Zulzalil, Hazura

    Published 2013
    “…The exposure of network packets to frequent cyber attacks has increased the need for designing statistical-based anomaly detection recently. Conceptually, the statistical based anomaly detection attracts researcher's attention, but technically, the low attack detection rates remains an open challenges. …”
    Get full text
    Conference or Workshop Item
  5. 5

    Effective dimensionality reduction of payload-based anomaly detection in TMAD model for HTTP payload by Kakavand, Mohsen, Mustapha, Norwati, Mustapha, Aida, Abdullah @ Selimun, Mohd Taufik

    Published 2016
    “…Our proposed anomaly detection also achieved comparable performance in terms of computational complexity when compared to three state-of-the-art anomaly detection systems.…”
    Get full text
    Article
  6. 6

    A survey of anomaly detection using data mining methods for hypertext transfer protocol web services by Kakavand, Mohsen, Mustapha, Norwati, Mustapha, Aida, Abdullah, Mohd Taufik, Riahi, Hamed

    Published 2015
    “…Data mining is widely recognized as popular and important intelligent and automatic tools to assist humans in big data security analysis and anomaly detection over IDSs. In this study we discuss our review in data mining anomaly detection methods for HTTP web services. …”
    Get full text
    Article
  7. 7
  8. 8
  9. 9
  10. 10

    An efficient anomaly intrusion detection method with evolutionary neural network by Sarvari, Samira

    Published 2020
    “…Despite all the strengths of the anomaly detection systems, there are still drawbacks that reduce the performance of the system. …”
    Get full text
    Thesis
  11. 11

    An integrated anomaly intrusion detection scheme using statistical, hybridized classifiers and signature approach by Mohamed Yassin, Warusia

    Published 2015
    “…In recent years, data mining based anomaly detection (DMAD), particularly classification methods, have been incessantly enhanced in differentiating normal and attack behaviour. …”
    Get full text
    Thesis
  12. 12

    Intrusion detection based on K-means clustering and Naïve Bayes classification by Muda, Zaiton, Mohamed Yassin, Warusia, Sulaiman, Md. Nasir, Udzir, Nur Izura

    Published 2011
    “…Intrusion Detection System (IDS) plays an effective way to achieve higher security in detecting malicious activities for a couple of years. Anomaly detection is one of intrusion detection system. …”
    Get full text
    Conference or Workshop Item
  13. 13

    Signature-based anomaly intrusion detection using integrated data mining classifiers by Yassin, Warusia, Udzir, Nur Izura, Abdullah, Azizol, Abdullah @ Selimun, Mohd Taufik, Zulzalil, Hazura, Muda, Zaiton

    Published 2014
    “…In this work, a novel Signature-Based Anomaly Detection Scheme (SADS) which could be applied to scrutinize packet headers' behaviour patterns more precisely and promptly is proposed. …”
    Get full text
    Conference or Workshop Item
  14. 14

    An overview of neural networks use in anomaly intrusion detection systems by Sani, Yusuf, Mohamedou, Ahmed, Ali, Khalid Abdullahi, Farjamfar, Anahita, Azman, Mohamed, Shamsuddin, Solahuddin

    Published 2009
    “…But the main problem of anomaly detection IDS is that; it is very difficult to build, because of the difficulty in defining what is normal and what is abnormal. …”
    Get full text
    Conference or Workshop Item
  15. 15

    An efficient anomaly intrusion detection method with evolutionary kernel neural network random weights by Sarvari, Samira, Mohd Sani, Nor Fazlida, Mohd Hanapi, Zurina, Abdullah @ Selimun, Mohd Taufik

    Published 2020
    “…Considering that using a combination of ANN and EA can produce an advanced technique to develop an efficient anomaly detection approach for IDS, several types of research have used ENN algorithms to detect the attacks. …”
    Get full text
    Article
  16. 16

    A proposed approach for diabetes diagnosis using neuro-fuzzy technique by Alasaady, Maher Talal, Mohd Aris, Teh Noranis, Mohd Sharef, Nurfadhlina, Hamdan, Hazlina

    Published 2022
    “…Normalization, imputation, and anomaly detection are part of the pre-processing stage. …”
    Article
  17. 17

    Improving intrusion detection using genetic algorithm by Hashemi, V. Moraveji, Muda, Zaiton, Yassin, Warusia

    Published 2013
    “…A great deal of attention has been recently paid to anomaly detection to accomplish intrusion detection. However, a major problem with this approach is maximizing detection rate and accuracy, as well as minimizing false alarm i.e., inability to correctly discover particular types of attacks. …”
    Get full text
    Article
  18. 18

    A systematic literature review on outlier detection in wireless sensor networks by Safaei, Mahmood, Asadi, Shahla, Driss, Maha, Boulila, Wadii, Alsaeedi, Abdullah, Chizari, Hassan, Abdullah, Rusli, Safaei, Mitra

    Published 2020
    “…The purpose of this paper is to conduct a systematic literature review to report the available works on outlier and anomaly detection in WSNs. The paper highlights works conducted from January 2004 to October 2018. …”
    Get full text
    Article
  19. 19

    Anomaly behavior detection using flexible packet filtering and support vector machine algorithms by Abdul Wahid, Mohammed N.

    Published 2016
    “…The main method is related to processing and filtering data packets using different types of packet filtering on network system and, more specifically, capturing and filtering data packets transmitted on high speed communications links for errors and attackers’ detection and signal integrity analysis. Many anomaly detection experiments have been conducted in order to investigate the performance of network traffics filtering methods that analyzing bandwidth, speed, errors and attackers. …”
    Get full text
    Thesis
  20. 20

    Statistical global investigation of pre-earthquake anomalous geomagnetic diurnal variation using superposed epoch analysis by Yusof, Khairul Adib, Abdullah, Mardina, Abdul Hamid, Nurul Shazana, Ahadi, Suaidi, Ghamry, Essam

    Published 2022
    “…However, the statistical significance of such anomalies detected using the diurnal variation range ratio (DVRR) method still requires verification as only a limited number of EQs occurring in certain seismoactive zones were included. …”
    Article