2014
DOI: 10.1007/s10994-014-5473-9
|View full text |Cite
|
Sign up to set email alerts
|

Analysis of network traffic features for anomaly detection

Abstract: Anomaly detection in communication networks provides the basis for the uncovering of novel attacks, misconfigurations and network failures. Resource constraints for data storage, transmission and processing make it beneficial to restrict input data to features that are (a) highly relevant for the detection task and (b) easily derivable from network observations without expensive operations. Removing strong correlated, redundant and irrelevant features also improves the detection quality for many algorithms tha… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
72
0

Year Published

2017
2017
2022
2022

Publication Types

Select...
6
2
1

Relationship

1
8

Authors

Journals

citations
Cited by 166 publications
(72 citation statements)
references
References 33 publications
0
72
0
Order By: Relevance
“…In order to increase the accuracy of the method considered and reduce the number of false positives, we propose to consider indirect supporting signs of attack, namely network characteristics. [42][43][44][45][46][47] describe the metrics by which cyber-attacks are indirectly detected. As an example, there is a model of a telecommunications network operating in an attack mode consisting of two steps, each of which violates the operation of the system with the probability p i .…”
Section: Resultsmentioning
confidence: 99%
“…In order to increase the accuracy of the method considered and reduce the number of false positives, we propose to consider indirect supporting signs of attack, namely network characteristics. [42][43][44][45][46][47] describe the metrics by which cyber-attacks are indirectly detected. As an example, there is a model of a telecommunications network operating in an attack mode consisting of two steps, each of which violates the operation of the system with the probability p i .…”
Section: Resultsmentioning
confidence: 99%
“…(DoS) attack, probe attack, user to root (U2R) attack, and remote to local (R2L) attack. The detail description about the NSL-KDD dataset can be found in [35][36][37]. Table 2 lists the number of instances in the training and testing sets.…”
Section: The Proposed Methodsmentioning
confidence: 99%
“…Eight numbers of hidden units are considered to collect the average of accuracy, the average of loss, the training time and the testing time of the ADDM. The numbers of hidden units used are 3,4,5,6,7,8,9, and 10. Table 3 summarizes the obtained results for each number of hidden units.…”
Section: B Optimum Pcc Threshold Selectionmentioning
confidence: 99%
“…Kim K. J. et al [8] have presented many optimization techniques that can improve the performance of a neural network for classification tasks. To improve the processing time and detection performance of the proposed method relevant features are selected using a Correlation-based Feature Selection method [9], [10]. The proposed method was evaluated on two datasets namely NSL-KDD [11] and UNSW-NB15 [12], [13].…”
Section: Introductionmentioning
confidence: 99%