2010 Second International Conference on Communication Software and Networks 2010
DOI: 10.1109/iccsn.2010.55
|View full text |Cite
|
Sign up to set email alerts
|

ARIMA Based Network Anomaly Detection

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

1
34
0

Year Published

2013
2013
2022
2022

Publication Types

Select...
5
2
2

Relationship

0
9

Authors

Journals

citations
Cited by 109 publications
(35 citation statements)
references
References 3 publications
1
34
0
Order By: Relevance
“…Other sources such as Jelen [21] underline that measurements as being taken by metrics are a critical point and that a metric should not rely on an isolated measurement. Furthermore, stochastic approaches have been successfully applied on threat intelligence data to address uncertainties in the data (e.g., [29,39,41]). Accordingly, we base our method on research and best practices of metrics.…”
Section: Overview Of Security Metricsmentioning
confidence: 99%
“…Other sources such as Jelen [21] underline that measurements as being taken by metrics are a critical point and that a metric should not rely on an isolated measurement. Furthermore, stochastic approaches have been successfully applied on threat intelligence data to address uncertainties in the data (e.g., [29,39,41]). Accordingly, we base our method on research and best practices of metrics.…”
Section: Overview Of Security Metricsmentioning
confidence: 99%
“…A summary of the related work is listed in Table 1. There are reviews addressing the chal- Scientific Work Reviews [19,27] Graph-based methods [2,12,13,36,37,41,42] Graph-based and time-sensitive methods [1,45] Machine learning-based [6,14,32] Statistical processes [33,44,48,50] Wavelet analysis [25,31,35] Industrial Intrusion Detection [3,15,18,20,23,28,34,38,39,46] lenge of anomaly detection for intrusion detection. García-Teodoro et al address the challenges of this field of work while presenting techniques and systems [19].…”
Section: Related Workmentioning
confidence: 99%
“…Consequently, an anomaly is detected if the observed behaviour does not match the modeled values. A common approach is using Auto-Regressive Integrated Moving Average (ARIMA) to model time series behaviour [33,48], Tabatabaie et al include a chaotic behaviour prediction into their ARIMA model [44]. Yu et al present an anomaly detection scheme based on ARIMA for Wireless Sensor Networkss (WSNs) [50].…”
Section: Related Workmentioning
confidence: 99%
“…For instance, it can be used as a tool for extracting the baseline of network traffic to capture the underlying traffic trend [4] and facilitate techniques such as traffic shaping for improved Quality of Service [5]. Moreover, it allows the detection of anomalies by blending network traffic forecasts with tolerable operational thresholds [6]. The method proposed in this paper is designed to facilitate security and monitoring services at the lower end of the infrastructure.…”
Section: Introductionmentioning
confidence: 98%