Real-Time Dynamic Network Anomaly Detection
نویسندگان
چکیده
منابع مشابه
Real-time analysis of aggregate network traffic for anomaly detection
Real-time Analysis of Aggregate Network Traffic for Anomaly Detection. (May 2005) Seong Soo Kim, B.S., Yonsei University; M.S., Yonsei University Chair of Advisory Committee: Dr. A. L. Narasimha Reddy The frequent and large-scale network attacks have led to an increased need for developing techniques for analyzing network traffic. If efficient analysis tools were available, it could become poss...
متن کاملUnsupervised Network Anomaly Detection in Real-Time on Big Data
Network anomaly detection relies on intrusion detection systems based on knowledge databases. However, building this knowledge may take time as it requires manual inspection of experts. Actual detection systems are unable to deal with 0-day attack or new user's behavior and in consequence they may fail in correctly detecting intrusions. Unsupervised network anomaly detectors overcome this issue...
متن کاملNetwork Anomaly Detection: Comparison and Real-Time Issues
This paper discusses several issues of evaluation and comparison of anomaly detection algorithms, namely lack of publicly available implementations and annotated data sets. Another problem of many methods is a detection delay caused by operating on data binned to a long time intervals. The paper presents a library under development which aims to tackle the comparison and evaluation issues. Furt...
متن کاملDynamic Network Evolution: Models, Clustering, Anomaly Detection
Traditionally, research on graph theory focused on studying graphs that are static. However, almost all real networks are dynamic in nature and large in size. Quite recently, research areas for studying the topology, evolution, applications of complex evolving networks and processes occurring in them and governing them attracted attention from researchers. In this work, we review the significan...
متن کاملDendritic Cells for Real-Time Anomaly Detection
Dendritic Cells (DCs) are innate immune system cells which have the power to activate or suppress the immune system. The behaviour of human DCs is abstracted to form an algorithm suitable for anomaly detection. We test this algorithm on the real-time problem of port scan detection. Our results show a significant difference in artificial DC behaviour for an outgoing portscan when compared to beh...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Intelligent Systems
سال: 2018
ISSN: 1541-1672
DOI: 10.1109/mis.2018.022441346