2019
DOI: 10.3390/app9030364
|View full text |Cite
|
Sign up to set email alerts
|

Efficacy Improvement of Anomaly Detection by Using Intelligence Sharing Scheme

Abstract: Computer networks are facing threats of ever-increasing frequency and sophistication. Encryption is becoming the norm in both legitimate and malicious network traffic. Therefore, intrusion detection systems (IDSs) are now required to work efficiently regardless of the encryption. In this study, we propose two new methods to improve the efficacy of the Cisco Cognitive Threat Analytics (CTA) system. In the first method, the efficacy of CTA is improved by sharing of intelligence information across a large number … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
4
2

Relationship

1
5

Authors

Journals

citations
Cited by 6 publications
(2 citation statements)
references
References 34 publications
(39 reference statements)
0
2
0
Order By: Relevance
“…However, machine learning has not been applied to radioactive source search scenarios, which shares many parallels with domains within computer security. A central factor for deploying machine learning in securitysensitive domains is feature scaling [23,30,31]. In network intrusion detection, there are many different kinds of features, which can contain outliers that can negatively affect standardization [30].…”
Section: Problem Definitionmentioning
confidence: 99%
“…However, machine learning has not been applied to radioactive source search scenarios, which shares many parallels with domains within computer security. A central factor for deploying machine learning in securitysensitive domains is feature scaling [23,30,31]. In network intrusion detection, there are many different kinds of features, which can contain outliers that can negatively affect standardization [30].…”
Section: Problem Definitionmentioning
confidence: 99%
“…Chandola et al [5] reviewed different types of anomalies, the different fields where anomaly detection is used, challenges of anomaly detection and algorithms that could be used for anomaly detection. The paper [6], mentioned that one of the main challenges of applying anomaly detection in the field of network security is that the nature of anomalies keeps changing with time and intruders try to adapt to evade detection.…”
Section: Related Work and State-of-the-artmentioning
confidence: 99%