2019
DOI: 10.1016/j.jnca.2018.12.006
|View full text |Cite
|
Sign up to set email alerts
|

A holistic review of Network Anomaly Detection Systems: A comprehensive survey

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
126
0

Year Published

2019
2019
2021
2021

Publication Types

Select...
6
3

Relationship

1
8

Authors

Journals

citations
Cited by 234 publications
(127 citation statements)
references
References 64 publications
1
126
0
Order By: Relevance
“…As a part of future work, it will be interesting to employ different intrusion detection datasets, subsequently gauge the performance of various classifiers. Experts have always urged the research community to experiment with different datasets and introduce novel techniques for network intrusion detection [33,34]. Another avenue which can be explored in future can possibly include the deployment of predictive models as scalable web services thereby leveraging the capabilities of MAMLS.…”
Section: Conclusion and Prospectsmentioning
confidence: 99%
“…As a part of future work, it will be interesting to employ different intrusion detection datasets, subsequently gauge the performance of various classifiers. Experts have always urged the research community to experiment with different datasets and introduce novel techniques for network intrusion detection [33,34]. Another avenue which can be explored in future can possibly include the deployment of predictive models as scalable web services thereby leveraging the capabilities of MAMLS.…”
Section: Conclusion and Prospectsmentioning
confidence: 99%
“…In the distributed deployment architecture, the NIDS is placed on each network node where nodes monitor each other's network transactions. The hybrid deployment employs both centralized and distributed architectures to leverage the benefits and reduce the shortcomings of the deployment strategies [4].…”
Section: Intrusion Detection System (Ids)mentioning
confidence: 99%
“…A botnet comprises a large number of hijacked nodes or systems in a network that are controlled by malicious users remotely. These nodes or systems are used to execute several types of attacks [4]. A botnet attack is usually characterized by three features, which are similarity of attack sources, divergence between normal and attack network traffic flow, and automation of attack execution [5].…”
Section: Introductionmentioning
confidence: 99%
“…The flows in experiments were generated from the packet capture -.PCAP file‖, using the -Argus tool‖ [23]. One of the reasons of using the Argus is the option to generate bidirectional flows.…”
Section: A Netflowsmentioning
confidence: 99%