标题
Network Anomaly Detection: Methods, Systems and Tools
作者
关键词
-
出版物
IEEE Communications Surveys and Tutorials
Volume 16, Issue 1, Pages 303-336
出版商
Institute of Electrical and Electronics Engineers (IEEE)
发表日期
2013-06-07
DOI
10.1109/surv.2013.052213.00046
参考文献
相关参考文献
注意:仅列出部分参考文献,下载原文获取全部文献信息。- Unsupervised Network Intrusion Detection Systems: Detecting the Unknown without Knowledge
- (2012) Pedro Casas et al. COMPUTER COMMUNICATIONS
- Toward developing a systematic approach to generate benchmark datasets for intrusion detection
- (2012) Ali Shiravi et al. COMPUTERS & SECURITY
- Hybrid intelligent systems for detecting network intrusions
- (2012) Mrutyunjaya Panda et al. Security and Communication Networks
- Artificial immune system based on interval type-2 fuzzy set paradigm
- (2011) A. Visconti et al. APPLIED SOFT COMPUTING
- A Survey of Outlier Detection Methods in Network Anomaly Identification
- (2011) P. Gogoi et al. COMPUTER JOURNAL
- Surveying Port Scans and Their Detection Methodologies
- (2011) M. H. Bhuyan et al. COMPUTER JOURNAL
- HMMPayl: An intrusion detection system based on Hidden Markov Models
- (2011) Davide Ariu et al. COMPUTERS & SECURITY
- A differentiated one-class classification method with applications to intrusion detection
- (2011) Inho Kang et al. EXPERT SYSTEMS WITH APPLICATIONS
- RT-MOVICAB-IDS: Addressing real-time intrusion detection
- (2011) Álvaro Herrero et al. Future Generation Computer Systems-The International Journal of eScience
- Anomaly Detection in Network Traffic Based on Statistical Inference and \alpha-Stable Modeling
- (2011) Federico Simmross-Wattenberg et al. IEEE Transactions on Dependable and Secure Computing
- Mutual information-based feature selection for intrusion detection systems
- (2011) Fatemeh Amiri et al. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
- Adaptive ROC-based ensembles of HMMs applied to anomaly detection
- (2011) Wael Khreich et al. PATTERN RECOGNITION
- An ensemble-based evolutionary framework for coping with distributed intrusion detection
- (2010) Gianluigi Folino et al. Genetic Programming and Evolvable Machines
- An Overview of IP Flow-Based Intrusion Detection
- (2010) A Sperotto et al. IEEE Communications Surveys and Tutorials
- A Survey on Network Coordinates Systems, Design, and Security
- (2010) Benoit Donnet et al. IEEE Communications Surveys and Tutorials
- Toward Credible Evaluation of Anomaly-Based Intrusion-Detection Methods
- (2010) Mahbod Tavallaee et al. IEEE TRANSACTIONS ON SYSTEMS MAN AND CYBERNETICS PART C-APPLICATIONS AND RE
- An Intrusion-Detection Model Based on Fuzzy Class-Association-Rule Mining Using Genetic Network Programming
- (2010) Shingo Mabu et al. IEEE TRANSACTIONS ON SYSTEMS MAN AND CYBERNETICS PART C-APPLICATIONS AND RE
- Intrusion detection for mobile devices using the knowledge-based, temporal abstraction method
- (2010) Asaf Shabtai et al. JOURNAL OF SYSTEMS AND SOFTWARE
- Anomaly detection
- (2009) Varun Chandola et al. ACM COMPUTING SURVEYS
- Sequential anomaly detection based on temporal-difference learning: Principles, models and case studies
- (2009) Xin Xu APPLIED SOFT COMPUTING
- The use of computational intelligence in intrusion detection systems: A review
- (2009) Shelly Xiaonan Wu et al. APPLIED SOFT COMPUTING
- Ensemble-based classifiers
- (2009) Lior Rokach ARTIFICIAL INTELLIGENCE REVIEW
- A research using hybrid RBF/Elman neural networks for intrusion detection system secure model
- (2009) Xiaojun Tong et al. COMPUTER PHYSICS COMMUNICATIONS
- A hybrid intrusion detection system design for computer network security
- (2009) M. Ali Aydın et al. COMPUTERS & ELECTRICAL ENGINEERING
- Building lightweight intrusion detection system using wrapper-based feature selection mechanisms
- (2009) Yang Li et al. COMPUTERS & SECURITY
- Intrusion detection by machine learning: A review
- (2009) Chih-Fong Tsai et al. EXPERT SYSTEMS WITH APPLICATIONS
- A survey of techniques for internet traffic classification using machine learning
- (2009) Thuy T.T. Nguyen et al. IEEE Communications Surveys and Tutorials
- A comparative analysis of network dependability, fault-tolerance, reliability, security, and survivability
- (2009) M. Al-Kuwaiti et al. IEEE Communications Surveys and Tutorials
- A Survey on Internet Traffic Identification
- (2009) Arthur Callado et al. IEEE Communications Surveys and Tutorials
- Intrusion detection using fuzzy association rules
- (2008) Arman Tajbakhsh et al. APPLIED SOFT COMPUTING
- McPAD: A multiple classifier system for accurate payload-based anomaly detection
- (2008) Roberto Perdisci et al. Computer Networks
- A real-time network intrusion detection system for large-scale attacks based on an incremental mining approach
- (2008) Ming-Yang Su et al. COMPUTERS & SECURITY
- Anomaly-based network intrusion detection: Techniques, systems and challenges
- (2008) P. García-Teodoro et al. COMPUTERS & SECURITY
- Data Fusion and Cost Minimization for Intrusion Detection
- (2008) Devi Parikh et al. IEEE Transactions on Information Forensics and Security
- Random-Forests-Based Network Intrusion Detection Systems
- (2008) Jiong Zhang et al. IEEE TRANSACTIONS ON SYSTEMS MAN AND CYBERNETICS PART C-APPLICATIONS AND RE
- Network Anomaly Detection Based on Wavelet Analysis
- (2008) Wei Lu et al. EURASIP Journal on Advances in Signal Processing
- A user-oriented ontology-based approach for network intrusion detection
- (2007) Shao-Shin Hung et al. COMPUTER STANDARDS & INTERFACES
- Intrusion detection in computer networks by a modular ensemble of one-class classifiers
- (2006) Giorgio Giacinto et al. Information Fusion
Publish scientific posters with Peeref
Peeref publishes scientific posters from all research disciplines. Our Diamond Open Access policy means free access to content and no publication fees for authors.
Learn MoreAsk a Question. Answer a Question.
Quickly pose questions to the entire community. Debate answers and get clarity on the most important issues facing researchers.
Get Started