Advances in Knowledge Discovery and Data Mining
DOI: 10.1007/978-3-540-68125-0_58
|View full text |Cite
|
Sign up to set email alerts
|

PAID: Packet Analysis for Anomaly Intrusion Detection

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
5
0

Publication Types

Select...
2
2
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(5 citation statements)
references
References 8 publications
0
5
0
Order By: Relevance
“…The normal behaviour of packets is profiled based on the protocol being employed (TCP, UDP, ICMP); this model outperforms the normal PHAD approach. Other works used different algorithms like PAID [39], which employs Bayesian and feature extraction methods for anomaly detection, and LNID [40]. The most recent modification for the PHAD was to update the normal profile, which the researchers did in [41].…”
Section: Related Workmentioning
confidence: 99%
“…The normal behaviour of packets is profiled based on the protocol being employed (TCP, UDP, ICMP); this model outperforms the normal PHAD approach. Other works used different algorithms like PAID [39], which employs Bayesian and feature extraction methods for anomaly detection, and LNID [40]. The most recent modification for the PHAD was to update the normal profile, which the researchers did in [41].…”
Section: Related Workmentioning
confidence: 99%
“…Another packet header anomaly detection, PAID (Lee, 2008) performed packet analysis for intrusion detection. PAID uses the Bayesian and feature extraction approach, as compared to PHAD and PbPHAD.…”
Section: Related Workmentioning
confidence: 99%
“…In this work, we focus on anomaly detection in HIDS using statistical analysis. Although many work have been done in the statistical-based anomaly detection, such as (Mahoney, 2001, Solahuddin, 2008, Lee, 2008, Rehman, 2012, Yingbing, 2012, Carlos, 2012& Xiong, 2013 and many more, increasing the attack detection rate is still a significant research issue especially with the excessive increase of numerous intrusions over the past decades.…”
Section: Introductionmentioning
confidence: 99%
“…Packet Analysis Anomaly Intrusion Detection (PAID) performs packet analysis in detecting intrusion [13]. Compared to PHAD and PbPHAD, PAID approaches use feature extraction and Bayesian analysis where packet features are transformed from continuous to discrete values before being fed into a Naïve Bayes Classifier.…”
Section: Related Workmentioning
confidence: 99%
“…Packet Header Anomaly Detection (PHAD) has attracted the attention of numerous researchers [9], [13], [14], [15], [16]. In PHADs, packet characteristics and behaviours are used to identify unusual behavior.…”
Section: Related Workmentioning
confidence: 99%