2014
DOI: 10.1587/transinf.e97.d.2084
|View full text |Cite
|
Sign up to set email alerts
|

Unsupervised Learning Model for Real-Time Anomaly Detection in Computer Networks

Abstract: SUMMARYDetecting a variety of anomalies caused by attacks or accidents in computer networks has been one of the real challenges for both researchers and network operators. An effective technique that could quickly and accurately detect a wide range of anomalies would be able to prevent serious consequences for system security or reliability. In this article, we characterize detection techniques on the basis of learning models and propose an unsupervised learning model for real-time anomaly detection in compute… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2015
2015
2020
2020

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(2 citation statements)
references
References 21 publications
0
2
0
Order By: Relevance
“…Machine learning is a well-known method in the field of encrypted traffic classification [8]. But the machine-learning method needs a great amount of labeled data to train a model in terms of achieving fine-grained classification [9], and it is difficult to realize in an actual network for the reasons that labeled data are hard to obtain [10] and the model should be updated periodically for coping with concept drift [11,12].…”
Section: Introductionmentioning
confidence: 99%
“…Machine learning is a well-known method in the field of encrypted traffic classification [8]. But the machine-learning method needs a great amount of labeled data to train a model in terms of achieving fine-grained classification [9], and it is difficult to realize in an actual network for the reasons that labeled data are hard to obtain [10] and the model should be updated periodically for coping with concept drift [11,12].…”
Section: Introductionmentioning
confidence: 99%
“…In recent years, the issue of anomaly detection from system logs has been a research hotspot of anomaly detection field [1]. As unstructured data, system logs are closely combined with text mining, statistics, machine learning and other domains [9]. Existing approaches are proposed, such as PCA based approaches over log message counters [2], invariant mining based methods to capture co-occurrence patterns between different log keys [3], and workflow based methods to identify execution anomalies in program logic flows [4].…”
Section: Introductionmentioning
confidence: 99%