A refined filter for UHAD to improve anomaly detection
Filtering is used in intrusion detection to remove the insignificant events from a log to facilitate the analysis method to focus on the significant events and to minimize processing overhead. Generally, filtering is performed using filtering rules, which are framed using a set of data training data...
| Main Authors: | Hajamydeen, Asif Iqbal, Udzir, Nur Izura |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
John Wiley & Sons
2016
|
| Online Access: | http://psasir.upm.edu.my/id/eprint/54906/ http://psasir.upm.edu.my/id/eprint/54906/1/A%20refined%20filter%20for%20UHAD%20to%20improve%20anomaly%20detection.pdf |
Similar Items
A detailed description on unsupervised heterogeneous anomaly based intrusion detection framework
by: Udzir, Nur Izura, et al.
Published: (2019)
by: Udzir, Nur Izura, et al.
Published: (2019)
Filtering events using clustering in heterogeneous security logs
by: Hajamydeen, Asif Iqbal, et al.
Published: (2011)
by: Hajamydeen, Asif Iqbal, et al.
Published: (2011)
Packet header anomaly detection using statistical analysis
by: Yassin, Warusia, et al.
Published: (2014)
by: Yassin, Warusia, et al.
Published: (2014)
A systematic review of machine learning and deep learning techniques for anomaly detection in data mining
by: Tahir, Mahjabeen, et al.
Published: (2025)
by: Tahir, Mahjabeen, et al.
Published: (2025)
Anomaly-based intrusion detection through K-means clustering and naives Bayes classification
by: Mohamed Yassin, Warusia, et al.
Published: (2013)
by: Mohamed Yassin, Warusia, et al.
Published: (2013)
Host-based packet header anomaly detection using statistical analysis
by: Yassin, Warusia, et al.
Published: (2013)
by: Yassin, Warusia, et al.
Published: (2013)
Signature-based anomaly intrusion detection using integrated data mining classifiers
by: Yassin, Warusia, et al.
Published: (2014)
by: Yassin, Warusia, et al.
Published: (2014)
An improved hybrid learning approach for better anomaly detection
by: Mohamed Yassin, Warusia
Published: (2011)
by: Mohamed Yassin, Warusia
Published: (2011)
Anomaly behavior detection using flexible packet filtering and support vector machine algorithms
by: Abdul Wahid, Mohammed N.
Published: (2016)
by: Abdul Wahid, Mohammed N.
Published: (2016)
Refined garbage collection for open distributed systems with multicapabilities
by: Udzir, Nur Izura, et al.
Published: (2008)
by: Udzir, Nur Izura, et al.
Published: (2008)
Dempster-Shafer for Anomaly Detection
by: Chen, Qi, et al.
Published: (2006)
by: Chen, Qi, et al.
Published: (2006)
Dendritic Cells for Anomaly Detection
by: Greensmith, Julie, et al.
Published: (2006)
by: Greensmith, Julie, et al.
Published: (2006)
Detection of Cross-Channel Anomalies
by: Pham, DucSon, et al.
Published: (2012)
by: Pham, DucSon, et al.
Published: (2012)
Traffic Scene Anomaly Detection
by: Lu, Cai An
Published: (2017)
by: Lu, Cai An
Published: (2017)
An Immune Inspired Approach to Anomaly Detection
by: Twycross, Jamie, et al.
Published: (2007)
by: Twycross, Jamie, et al.
Published: (2007)
Anomaly detection for vision-based inspection
by: Chew, Yan Zhe
Published: (2022)
by: Chew, Yan Zhe
Published: (2022)
Towards enhancing unsupervised anomaly detection by improving complexity, dimensionality and class-boundary properties
by: Babaei, Kasra
Published: (2022)
by: Babaei, Kasra
Published: (2022)
A naturally inspired statistical intrusion detection model
by: Mahboubian, Mohammad, et al.
Published: (2013)
by: Mahboubian, Mohammad, et al.
Published: (2013)
An improved palm oil refining process
by: Tan, Chin Ping, et al.
Published: (2012)
by: Tan, Chin Ping, et al.
Published: (2012)
Anomaly Detection Framework for PingER Data
by: Danny Wilson, Mandai, et al.
Published: (2015)
by: Danny Wilson, Mandai, et al.
Published: (2015)
Dendritic Cells for Real-Time Anomaly Detection
by: Greensmith, Julie, et al.
Published: (2006)
by: Greensmith, Julie, et al.
Published: (2006)
Generative Models for Anomaly Detection and Its Applications
by: Yu, Jongmin
Published: (2020)
by: Yu, Jongmin
Published: (2020)
Anomaly detection with Attention-based deep autoencoder
by: Yong, Hong Long
Published: (2022)
by: Yong, Hong Long
Published: (2022)
Improving intrusion detection for better anomaly detection based on x-means clustering and multi-layer perceptron classification
by: Abbas, Borkan Ahmed
Published: (2016)
by: Abbas, Borkan Ahmed
Published: (2016)
An improved negative selection algorithm based on the hybridization of cuckoo search and differential evolution for anomaly detection
by: Ayodele Nojeem, Lasisi
Published: (2018)
by: Ayodele Nojeem, Lasisi
Published: (2018)
A comparison of different technique in flow based anomaly detection
by: Salah, Mohammad
Published: (2017)
by: Salah, Mohammad
Published: (2017)
A lightweight tool for anomaly detection in cloud data centres
by: Barbhuiya, Salim, et al.
Published: (2015)
by: Barbhuiya, Salim, et al.
Published: (2015)
A study on advanced statistical analysis for network anomaly detection
by: Ngadi, Md. Asri, et al.
Published: (2005)
by: Ngadi, Md. Asri, et al.
Published: (2005)
Supervised anomaly detection in uncertain pseudoperiodic data streams
by: Ma, Jiangang, et al.
Published: (2016)
by: Ma, Jiangang, et al.
Published: (2016)
Using Transformer Models for Stock Market Anomaly Detection
by: Biriukova, Kseniia, et al.
Published: (2023)
by: Biriukova, Kseniia, et al.
Published: (2023)
Unsupervised Anomaly Detection with Unlabeled Data Using Clustering
by: Chimphlee, Witcha, et al.
Published: (2005)
by: Chimphlee, Witcha, et al.
Published: (2005)
Information Fusion for Anomaly Detection with the Dendritic Cell Algorithm
by: Greensmith, Julie, et al.
Published: (2007)
by: Greensmith, Julie, et al.
Published: (2007)
Anomaly detection in large-scale data stream networks
by: Pham, DucSon, et al.
Published: (2014)
by: Pham, DucSon, et al.
Published: (2014)
Effective Anomaly detection in Sensor Network Data Streams
by: Pham, DucSon, et al.
Published: (2009)
by: Pham, DucSon, et al.
Published: (2009)
Video surveillance: Anomaly action detection at front yard
by: Lee, Yong Jin
Published: (2024)
by: Lee, Yong Jin
Published: (2024)
Improvement anomaly intrusion detection using Fuzzy-ART based on K-means based on SNC Labeling
by: Zulaiha Ali Othman,, et al.
Published: (2011)
by: Zulaiha Ali Othman,, et al.
Published: (2011)
Multi-phase dual-encoder model for anomaly detection in medical imaging
by: Nur Rusyidah Azri,, et al.
Published: (2025)
by: Nur Rusyidah Azri,, et al.
Published: (2025)
Anomaly detection in vessel tracking: a Bayesian Networks (BNs) approach
by: Handayani, Dini, et al.
Published: (2015)
by: Handayani, Dini, et al.
Published: (2015)
Enhanced Techniques For Detection And Classification Of Neighbor Discovery Protocol Anomalies
by: Firas (M.H.) S., Najjar
Published: (2016)
by: Firas (M.H.) S., Najjar
Published: (2016)
LS-ADT: Lightweight and scalable anomaly detection for cloud datacentres
by: Barbhuiya, Salim, et al.
Published: (2016)
by: Barbhuiya, Salim, et al.
Published: (2016)
Similar Items
-
A detailed description on unsupervised heterogeneous anomaly based intrusion detection framework
by: Udzir, Nur Izura, et al.
Published: (2019) -
Filtering events using clustering in heterogeneous security logs
by: Hajamydeen, Asif Iqbal, et al.
Published: (2011) -
Packet header anomaly detection using statistical analysis
by: Yassin, Warusia, et al.
Published: (2014) -
A systematic review of machine learning and deep learning techniques for anomaly detection in data mining
by: Tahir, Mahjabeen, et al.
Published: (2025) -
Anomaly-based intrusion detection through K-means clustering and naives Bayes classification
by: Mohamed Yassin, Warusia, et al.
Published: (2013)