2017 IEEE 4th International Conference on Cyber Security and Cloud Computing (CSCloud) 2017
DOI: 10.1109/cscloud.2017.26
|View full text |Cite
|
Sign up to set email alerts
|

Unsupervised Labeling for Supervised Anomaly Detection in Enterprise and Cloud Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
19
0

Year Published

2017
2017
2024
2024

Publication Types

Select...
3
3

Relationship

1
5

Authors

Journals

citations
Cited by 26 publications
(19 citation statements)
references
References 7 publications
0
19
0
Order By: Relevance
“…This technique assumes that there are two classes of entities for normal and abnormal behavior. Normally, a model is constructed for the normal and anomaly classes, after which the data not previously studied are compared to both classes to find out the one to which one it belongs [22].…”
Section: Background On Network Anomaly Detection Methodsmentioning
confidence: 99%
“…This technique assumes that there are two classes of entities for normal and abnormal behavior. Normally, a model is constructed for the normal and anomaly classes, after which the data not previously studied are compared to both classes to find out the one to which one it belongs [22].…”
Section: Background On Network Anomaly Detection Methodsmentioning
confidence: 99%
“…[1] The authors used Python written Theano as a deep learning framework and selected RNN to be used because of high amount of dimensions in the data. They selected NSL-KDD dataset to be used during tests, as it resolves KDDCup99 dataset known problems, such as inherent redundant records [1,[5][6][7]. NSL-KDD dataset includes 41 variables, of which 38 are numeric and 3 non-numeric.…”
Section: Network Anomaly Detection With Deep Learningmentioning
confidence: 99%
“…They stated that, because of IDSs lack of ability to detect earlier unknown attacks, the research community is moving towards the machine learning based smart IDS, which can adopt new and constantly changing network attacks and reduces the existing problem from occurring. [4][5][6][7] The authors proposed AE with stochastic anomaly threshold determination algorithm. They tested and compared performance of stochastic and deterministic AE's with the proposed algorithm.…”
Section: Xiaoyong Yuan Et Al Proposed Bidirectional Recurrent Neuralmentioning
confidence: 99%
“…A large body of studies employed clustering for intrusion/anomaly detection [27,28,29,30,31]. The main focus of many of the past studies was on identifying intrusive events individually with a trained model consisting of normal or anomalous behaviors.…”
Section: Related Workmentioning
confidence: 99%
“…Clustering has been employed for network anomaly detection in previous studies [32,27,29,31]. The main focus of the past studies is on determining whether individual connections are anomalous or not.…”
Section: Anomalous State Detection Using Clustered Patternsmentioning
confidence: 99%