2006
DOI: 10.1007/11790754_5
|View full text |Cite
|
Sign up to set email alerts
|

Detecting Unknown Network Attacks Using Language Models

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

1
46
0

Year Published

2006
2006
2020
2020

Publication Types

Select...
3
3
2

Relationship

2
6

Authors

Journals

citations
Cited by 48 publications
(47 citation statements)
references
References 35 publications
1
46
0
Order By: Relevance
“…Our method Zeta [44] is an anomaly score based on the concept of k-nearest neighbors; it extends the outlier detection methods proposed in [45,46]. The score is calculated as the mean distance of x to its k-nearest neighbors normalized by the mean inner-clique distance.…”
Section: Unsupervised Anomaly Detectionmentioning
confidence: 99%
See 1 more Smart Citation
“…Our method Zeta [44] is an anomaly score based on the concept of k-nearest neighbors; it extends the outlier detection methods proposed in [45,46]. The score is calculated as the mean distance of x to its k-nearest neighbors normalized by the mean inner-clique distance.…”
Section: Unsupervised Anomaly Detectionmentioning
confidence: 99%
“…1 Some explore local properties of the provided data for determining outliers, e.g. single-linkage clustering [32] and our k-nearest neighbor method Zeta [44], others analyze global properties, e.g. the simplified Mahalanobis distance [13] and quarter-sphere SVM [42], to identify instances deviating from the mass of data.…”
Section: Unsupervised Anomaly Detectionmentioning
confidence: 99%
“…In addition, Latent Dirichlet Allocations are used for a similar purpose in [20]. NLP is also applied on network packet payloads for network intrusion detection in [18]. In [10], customers accesses to businesses URLs are analyzed using a word2vec-based method to propose better services to customers.…”
Section: Related Workmentioning
confidence: 99%
“…Such capability can only be provided by self-learning components which capture characteristics of observed normal data to flag anomalies as malicious events. Such methods have been previously proposed for general-purpose intrusion detection systems for IP networks, e.g., [5,7,11,12,21]. The peculiarities of the network protocols used in IMS, e.g., the Session Initiation Protocol, necessitate the development of specialized intrusion detection techniques tailored to their semantics.…”
Section: Introductionmentioning
confidence: 99%