2013
DOI: 10.1007/978-3-642-36784-7_7
|View full text |Cite
|
Sign up to set email alerts
|

A Methodological Overview on Anomaly Detection

Abstract: In this Chapter we give an overview of statistical methods for anomaly detection (AD), thereby targeting an audience of practitioners with general knowledge of statistics. We focus on the applicability of the methods by stating and comparing the conditions in which they can be applied and by discussing the parameters that need to be set

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

1
15
0

Year Published

2014
2014
2019
2019

Publication Types

Select...
3
3
3

Relationship

4
5

Authors

Journals

citations
Cited by 25 publications
(16 citation statements)
references
References 72 publications
1
15
0
Order By: Relevance
“…Then the system administrator makes a decision: if the process is allowed, then the relevant information is entered into the user profile and the permission to performing of the operation is given. Otherwise, the process is blocked and the user is notified of it [5].…”
Section: General Intelligent Agent Architecturementioning
confidence: 99%
See 1 more Smart Citation
“…Then the system administrator makes a decision: if the process is allowed, then the relevant information is entered into the user profile and the permission to performing of the operation is given. Otherwise, the process is blocked and the user is notified of it [5].…”
Section: General Intelligent Agent Architecturementioning
confidence: 99%
“…are among the existing methods for DCS security [3,4,5]. They perform analysis of output data and implement algorithms of response to threats.…”
Section: Introductionmentioning
confidence: 99%
“…In the recent years several anomaly-based IDSs have been proposed in the literature, differing in terms of traffic descriptors and decision algorithms, as testified by the several surveys on the topic [3][4] [5]. In general they act on monodimensional time series and, to consider different traffic features, the same basic algorithm is sequentially repeated [6], [7], [8].…”
Section: Related Workmentioning
confidence: 99%
“…To this aim, the capabilities of the so-called anomalybased IDSs have been deeply investigated, taking into account different traffic descriptors, aggregation levels, and statistical approaches (see, for instance, [1] and references therein). Roughly speaking, a reference model, corresponding to the normal network behaviour (i.e., without attacks) is built, and deviations from this profile are associated to possible attacks.…”
Section: Introductionmentioning
confidence: 99%