2015
DOI: 10.1016/j.asoc.2015.05.019
|View full text |Cite
|
Sign up to set email alerts
|

Autonomous profile-based anomaly detection system using principal component analysis and flow analysis

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
23
0

Year Published

2017
2017
2022
2022

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 43 publications
(23 citation statements)
references
References 35 publications
(39 reference statements)
0
23
0
Order By: Relevance
“…Furthermore, the response information can be symbolised by a reduced fixed set of dimensions without much loss of information (Hamamoto et al, 2017). Besides, It analyses noteworthy information data from logs to finds the important activity time intervals among the data set, and afterward diminish them, so this new set can professionally characterize to the consistent conduct of a network segment (Fernandes, Rodrigues, & Proença, 2015).…”
Section: Random Forest (Rf)mentioning
confidence: 99%
“…Furthermore, the response information can be symbolised by a reduced fixed set of dimensions without much loss of information (Hamamoto et al, 2017). Besides, It analyses noteworthy information data from logs to finds the important activity time intervals among the data set, and afterward diminish them, so this new set can professionally characterize to the consistent conduct of a network segment (Fernandes, Rodrigues, & Proença, 2015).…”
Section: Random Forest (Rf)mentioning
confidence: 99%
“…Tan et al [17] presented a prediction model of data flow based on linear autoregressive analysis and further proposed a real-time detection algorithm for outliers identification and compression processing. Fernandes et al [18] propose an autonomous profile-based anomaly detection system using principal component analysis and flow analysis to mitigate the impact of false data injection. By making inference of end-to-end measurements collected by relay nodes, Zheng et al [19] proposed a trust-assisted framework for detecting and localizing network anomalies in a hierarchical sensor network, which also can obtain a flexible tradeoff between inference accuracy and probing overhead.…”
Section: Related Workmentioning
confidence: 99%
“…υ 0 is a weighting exponent on each fuzzy membership that determines the amount of fuzziness of the resulting classification, and is set to 2. By using the Lagrange's multiplier to optimize formula (18), the problem is equivalent to find the minimum value of the Eq. (6).…”
Section: Cluster Formation Algorithmmentioning
confidence: 99%
“…The need for such tools is based on our increasing dependence on computer systems, the growing convergence between physical and cyber systems discussed earlier, and recent events that demonstrate how nations use cyber warfare against each other. This, of course, does not disregard the advances in more traditional areas of cyber security, such as malware research, cryptography [Ganeshkumar et al 2014], early detection and intervention [Fernandes et al 2015], and privacy [Jentzsch 2015].…”
Section: Cyber Definitionmentioning
confidence: 99%