2004
DOI: 10.1016/j.comcom.2004.07.002
|View full text |Cite
|
Sign up to set email alerts
|

Anomaly detection methods in wired networks: a survey and taxonomy

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
47
0

Year Published

2009
2009
2021
2021

Publication Types

Select...
7
3

Relationship

0
10

Authors

Journals

citations
Cited by 131 publications
(47 citation statements)
references
References 30 publications
(40 reference statements)
0
47
0
Order By: Relevance
“…In surveys such as [24,25], authors discuss anomaly detection in general and cover the network intrusion detection domain only briefly. In several review papers [26][27][28][29][30][31][32] various network anomaly detection methods have been summarized. From aforementioned surveys one can find that the most effective methods of network anomaly detection are Principle Component Analysis [33][34][35], Wavelet analysis [36][37][38], Markovian models [39,40], Clustering [41][42][43], Histograms [44,45], Sketches [46,47], and Entropies [8,15,48].…”
Section: General Overview Of Network Anomaly Techniquesmentioning
confidence: 99%
“…In surveys such as [24,25], authors discuss anomaly detection in general and cover the network intrusion detection domain only briefly. In several review papers [26][27][28][29][30][31][32] various network anomaly detection methods have been summarized. From aforementioned surveys one can find that the most effective methods of network anomaly detection are Principle Component Analysis [33][34][35], Wavelet analysis [36][37][38], Markovian models [39,40], Clustering [41][42][43], Histograms [44,45], Sketches [46,47], and Entropies [8,15,48].…”
Section: General Overview Of Network Anomaly Techniquesmentioning
confidence: 99%
“…In detection mode, each sample that does not fit the model is labelled as anomalous. This notion has been thoroughly explored over the last two decades and applied to multiple domains in the security arena [4,12,15].…”
Section: Anomaly Detection In Smart Devicesmentioning
confidence: 99%
“…Additionally, 'anomaly IPS/IDS systems rely on the subjacent concept of 'normality' within the core or edges of the network. 'Normality' is defined using a relational model of the dynamic variables affecting the network state and an event is defined as anomalous, if the variation of its characteristics from the 'normal' network behaviour is too large, for network-unique preset limits, [12]. Setting these limits and defining 'normal' behaviour is so difficult and complex, often leading to many false positives for a stringent security paradigm.…”
Section: Problems With Modern Ids/ips Systemsmentioning
confidence: 99%