Intrusion Detection Systems 2011
DOI: 10.5772/15365
|View full text |Cite
|
Sign up to set email alerts
|

Social Network Approach to Anomaly Detection in Network Systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2014
2014
2016
2016

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 21 publications
0
2
0
Order By: Relevance
“…By using comparative metrics of network's structure during normal and abnormal operation, we can discover security policy breaches in a network. One can assume that network communication between nodes, constitutes a social network of users and their applications, so the appropriate methods of social network formal analysis can be applied [12]. In on-line social systems perpetrators of malicious behavior often display patterns of interaction that are quite different from regular users, which can be identified through the application of anomaly detection techniques.…”
Section: Motivationmentioning
confidence: 99%
“…By using comparative metrics of network's structure during normal and abnormal operation, we can discover security policy breaches in a network. One can assume that network communication between nodes, constitutes a social network of users and their applications, so the appropriate methods of social network formal analysis can be applied [12]. In on-line social systems perpetrators of malicious behavior often display patterns of interaction that are quite different from regular users, which can be identified through the application of anomaly detection techniques.…”
Section: Motivationmentioning
confidence: 99%
“…By using comparative metrics of network's structure during normal and abnormal operation, we can discover security policy breaches in a network. One can assume that network communication between nodes constitutes a social network of users and their applications, so the appropriate methods of social network formal analysis can be applied (Kołaczek and Prusiewicz, 2011). In on-line social systems perpetrators of malicious behavior often display patterns of interaction that are quite different from regular users, which can be identified through the application of anomaly detection techniques.…”
Section: Motivationmentioning
confidence: 99%