Similarity Based Feature Transformation for Network Anomaly Detection

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Behavioral Feature Extraction for Network Anomaly Detection

Early, James P. Ph.D., Purdue University, August, 2005. Behavioral Feature Extraction for Network Anomaly Detection. Major Professors: Carla E. Brodley and Eugene H. Spafford. This dissertation presents an analysis of the features of network traffic commonly used in network-based anomaly detection systems. It is an examination designed to identify how the selection of a particular protocol attr...

متن کامل

Automated Feature Weighting for Network Anomaly Detection

A number of network features is used to describe normal and intrusive traffic patterns. However the choice of features is dependent on which pattern to be detected. In order to identify which network features are more important for a particular network pattern, we propose an automated feature weighting method based on a fuzzy subspace approach to vector quantization modeling that can assign a w...

متن کامل

Feature-based anomaly detection

A feature-based approach for detecting anomalies in spectral, spatial, temporal, and other domains is described. When the frequency of occurrence is small relative to the background, anomalies such as man-made objects in natural image backgrounds do not form their own clusters, but are instead assigned the nearest background cluster, becoming an outlier (statistical anomaly) in that cluster. Ou...

متن کامل

Coevolutionary-based Mechanisms for Network Anomaly Detection

The paper presents an approach based on the principles of immune systems applied to the anomaly detection problem. Flexibility and efficiency of the anomaly detection system are achieved by building a model of the network behavior based on the self–nonself space paradigm. Covering both self and nonself spaces by hyperrectangular structures is proposed. The structures corresponding to self-space...

متن کامل

Network-based Anomaly Detection for Insider Trading

Insider trading is one of the numerous white collar crimes that can contribute to the instability of the economy. Traditionally, the detection of illegal insider trades has been a human-driven process. In this paper, we collect the insider trade filings made available by the US Securities and Exchange Commissions (SEC) through the EDGAR system, with the aim of initiating an automated large-scal...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IEEE Access

سال: 2020

ISSN: 2169-3536

DOI: 10.1109/access.2020.2975716