2015 8th International Conference on Database Theory and Application (DTA) 2015
DOI: 10.1109/dta.2015.19
|View full text |Cite
|
Sign up to set email alerts
|

Applications of Clustering Methods to Anomaly-Based Intrusion Detection Systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2017
2017
2024
2024

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(2 citation statements)
references
References 20 publications
0
2
0
Order By: Relevance
“…If it is not, then the work of the method is difficult. Using an inappropriate measure of proximity of objects affects the frequency of false alarms [28].…”
Section: Background On Network Anomaly Detection Methodsmentioning
confidence: 99%
“…If it is not, then the work of the method is difficult. Using an inappropriate measure of proximity of objects affects the frequency of false alarms [28].…”
Section: Background On Network Anomaly Detection Methodsmentioning
confidence: 99%
“…Typically, there is no prior knowledge to characterize an anomaly, nor ample data is available in any of the practical fields that symbolize these outliers [2]. A few examples of anomaly detection are the detection of rare (unusual) events in real life scenarios such as medical complications depicted in ECG/EEG data abnormalities [3], [4], [5], malfunctioning of rotary machines due to various physical factors [6], [7], security threat in cyberphysical systems [8], [9], [10], [11] or even fraud detection in financial systems [12].…”
Section: Introductionmentioning
confidence: 99%