2013
DOI: 10.1109/mitp.2013.7
|View full text |Cite
|
Sign up to set email alerts
|

An Overview of Anomaly Detection

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2014
2014
2023
2023

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 13 publications
(6 citation statements)
references
References 3 publications
0
6
0
Order By: Relevance
“…An NIDS gathers information from various network sources and does automatic analysis of signs of any intrusions or misuses and triggers alarms for the network administrators. Figure [1] shows the taxonomy of an NIDS. For any IDS sensors detect intrusions, analysis of the intrusion is done and appropriate response is generated.…”
Section: Network Intrusion Detection Systemsmentioning
confidence: 99%
See 3 more Smart Citations
“…An NIDS gathers information from various network sources and does automatic analysis of signs of any intrusions or misuses and triggers alarms for the network administrators. Figure [1] shows the taxonomy of an NIDS. For any IDS sensors detect intrusions, analysis of the intrusion is done and appropriate response is generated.…”
Section: Network Intrusion Detection Systemsmentioning
confidence: 99%
“…We have enlisted few of the important works here: suffer from scalability issues when applied to large network traffic traces [1], [35].…”
Section: Network Based Anomaly Detectionmentioning
confidence: 99%
See 2 more Smart Citations
“…With cloud computing taking many of its concepts from grid computing and cluster technology, research was carried out into anomaly detection and the different approaches that are currently being used in existing technologies [9] [4]. Investigating different areas that need to be considered from metrics selection [10] [11] to machine learning [12] [13].…”
Section: Related Workmentioning
confidence: 99%