Online and Scalable Unsupervised Network Anomaly Detection Method
نویسندگان
چکیده
منابع مشابه
BotOnus: an online unsupervised method for Botnet detection
Botnets are recognized as one of the most dangerous threats to the Internet infrastructure. They are used for malicious activities such as launching distributed denial of service attacks, sending spam, and leaking personal information. Existing botnet detection methods produce a number of good ideas, but they are far from complete yet, since most of them cannot detect botnets in an early stage ...
متن کاملNetwork Anomaly Detection Using Unsupervised Model
Most existing network intrusion detection systems use signature-based methods which depend on labeled training data. This training data is usually expensive to produce due to cost of laboratory set up, experienced or knowledge person and non availability of ready software tool. Above all, these methods have difficulty in detecting new or unknown types of attacks. Using unsupervised anomaly dete...
متن کاملUnsupervised Clustering Approach for Network Anomaly Detection
This paper describes the advantages of using the anomaly detection approach over the misuse detection technique in detecting unknown network intrusions or attacks. It also investigates the performance of various clustering algorithms when applied to anomaly detection. Five different clustering algorithms: k-Means, improved k-Means, k-Medoids, EM clustering and distance-based outlier detection a...
متن کاملUnsupervised Anomaly Detection in Network Intrusion Detection Using Clusters
Most current network intrusion detection systems employ signature-based methods or data mining-based methods which rely on labeled training data. This training data is 90 typically expensive to produce. Moreover, these methods have difficulty in detecting new types of attack. In this paper, we have discussed anomaly based instruction detection, pros and cons of anomaly detection, supervised and...
متن کاملUnsupervised Anomaly Detection
This paper describes work on the detection of anomalous material in text. We show several variants of an automatic technique for identifying an 'unusual' segment within a document, and consider texts which are unusual because of author, genre [Biber, 1998], topic or emotional tone. We evaluate the technique using many experiments over large document collections, created to contain randomly inse...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Transactions on Network and Service Management
سال: 2017
ISSN: 1932-4537
DOI: 10.1109/tnsm.2016.2627340