2007
DOI: 10.1016/j.comnet.2007.04.017
|View full text |Cite
|
Sign up to set email alerts
|

Network anomaly detection with incomplete audit data

Abstract: (ABSTRACT)With the ever increasing deployment and usage of gigabit networks, traditional network anomaly detection based intrusion detection systems have not scaled accordingly. Most, if not all, systems deployed assume the availability of complete and clean data for the purpose of intrusion detection. We contend that this assumption is not valid. Factors like noise in the audit data, mobility of the nodes, and the large amount of data generated by the network make it difficult to build a normal traffic profil… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
9
0

Year Published

2009
2009
2015
2015

Publication Types

Select...
3
3
3

Relationship

0
9

Authors

Journals

citations
Cited by 28 publications
(9 citation statements)
references
References 56 publications
0
9
0
Order By: Relevance
“…The application shows that the model is feasible and effective [12]. Through simple correlation function of extension theory to determine the index weight, through extensive correlation analysis of various dimensions of evaluation value, reflecting the extension evaluation based on data mining the useful information ability, to ensure the objectivity and accuracy of evaluation.…”
Section: Resultsmentioning
confidence: 99%
“…The application shows that the model is feasible and effective [12]. Through simple correlation function of extension theory to determine the index weight, through extensive correlation analysis of various dimensions of evaluation value, reflecting the extension evaluation based on data mining the useful information ability, to ensure the objectivity and accuracy of evaluation.…”
Section: Resultsmentioning
confidence: 99%
“…The following is to describe current analysis methods applied in intrusion detection system (Bace, 2002;Lu, Boedihardjo, & Manalwar, 2005;Patcha & Park, 2007;Verwoerd & Hunt, 2002):…”
Section: Current Analysis Methodsmentioning
confidence: 99%
“…The Stochastic Clustering Algorithm for Network Anomaly Detection (SCAN) method proposed by Patcha and Park [26] detects Denial of Service (DoS) attacks in high speed networks. High speed network traffic may contain noise and incomplete audit data.…”
Section: Methodsmentioning
confidence: 99%