2018
DOI: 10.1007/s11235-018-0475-8
|View full text |Cite
|
Sign up to set email alerts
|

A comprehensive survey on network anomaly detection

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
110
0
3

Year Published

2019
2019
2024
2024

Publication Types

Select...
8
1

Relationship

0
9

Authors

Journals

citations
Cited by 245 publications
(154 citation statements)
references
References 140 publications
0
110
0
3
Order By: Relevance
“…The detection phase is done by the implementation of the entropy algorithm, which analyzes the data obtained in the monitoring phase, and can detect malicious flows. Compared with other tools based on patterns [32], statistical algorithms like the entropy calculation do not require a big amount of memory or storage. This transforms these approaches in a suitable solution for its inclusion into the SDN network elements.…”
Section: Detectionmentioning
confidence: 99%
“…The detection phase is done by the implementation of the entropy algorithm, which analyzes the data obtained in the monitoring phase, and can detect malicious flows. Compared with other tools based on patterns [32], statistical algorithms like the entropy calculation do not require a big amount of memory or storage. This transforms these approaches in a suitable solution for its inclusion into the SDN network elements.…”
Section: Detectionmentioning
confidence: 99%
“…An effective program should provide a means of providing explanations to what patterns are being displayed. Compared with command line tools that can pipe data to other applications, visualizations are usually standalone programs (Fernandes et al, 2019). When visualizations support only a specific data format, it is difficult to work with these programs in conjunction with other analytic tools.…”
Section: Cybersecurity Visualizationsmentioning
confidence: 99%
“…The other field of which we describe related work is traffic anomaly detection . Anomaly detection usually consists of two phases: the learning phase and a testing phase.…”
Section: Related Workmentioning
confidence: 99%