A study on advanced statistical analysis for network anomaly detection
Algorithms for building detection models are usually classified into two categories: misuse detection and anomaly detection. Misuse detection algorithms model know attack behavior. They compare sensor data to attack patterns learned from the training data. Anomaly detection algorithms model normal b...
| Main Authors: | Ngadi, Md. Asri, Idris, Mohd. Yazid, Abdullah, Abd. Hanan |
|---|---|
| Format: | Monograph |
| Published: |
Faculty of Computer Science and Information System
2005
|
| Online Access: | http://eprints.utm.my/9074/ |
Similar Items
Packet header anomaly detection using statistical analysis
by: Yassin, Warusia, et al.
Published: (2014)
by: Yassin, Warusia, et al.
Published: (2014)
Iterative window size estimation on self-similarity measurement for network traffic anomaly detection
by: Idris, Mohd. Yazid, et al.
Published: (2004)
by: Idris, Mohd. Yazid, et al.
Published: (2004)
Anomaly network intrusion detection method in network security based on principle component analysis
by: Chimphlee, Witcha, et al.
Published: (2006)
by: Chimphlee, Witcha, et al.
Published: (2006)
Host-based packet header anomaly detection using statistical analysis
by: Yassin, Warusia, et al.
Published: (2013)
by: Yassin, Warusia, et al.
Published: (2013)
Unsupervised Anomaly Detection with Unlabeled Data Using Clustering
by: Chimphlee, Witcha, et al.
Published: (2005)
by: Chimphlee, Witcha, et al.
Published: (2005)
A survey on MANET intrusion detection
by: Mandala, Satria, et al.
Published: (2008)
by: Mandala, Satria, et al.
Published: (2008)
Integrating genetic algorithms and fuzzy c-means for anomaly detection
by: Chimphlee, Witcha, et al.
Published: (2005)
by: Chimphlee, Witcha, et al.
Published: (2005)
Anomaly detection in large-scale data stream networks
by: Pham, DucSon, et al.
Published: (2014)
by: Pham, DucSon, et al.
Published: (2014)
Effective Anomaly detection in Sensor Network Data Streams
by: Pham, DucSon, et al.
Published: (2009)
by: Pham, DucSon, et al.
Published: (2009)
An integrated anomaly intrusion detection scheme using statistical, hybridized classifiers and signature approach
by: Mohamed Yassin, Warusia
Published: (2015)
by: Mohamed Yassin, Warusia
Published: (2015)
To identify suspicious activity in anomaly detection based on soft computing
by: Chimphlee, Witcha, et al.
Published: (2006)
by: Chimphlee, Witcha, et al.
Published: (2006)
Anomaly detection of intrusion based on integration of rough sets and fuzzy c-means
by: Chimphlee, Witcha, et al.
Published: (2005)
by: Chimphlee, Witcha, et al.
Published: (2005)
Anomaly-based intrusion detection using fuzzy rough clustering
by: Chimphlee, Witcha, et al.
Published: (2006)
by: Chimphlee, Witcha, et al.
Published: (2006)
An Investigation of Power Law Probability Distributions for Network Anomaly Detection
by: Prandl, S., et al.
Published: (2017)
by: Prandl, S., et al.
Published: (2017)
RED-Based Technique for Detecting and Avoiding Anomaly Network Congestion
by: Montaser, Mohamed Mostafa, et al.
Published: (2018)
by: Montaser, Mohamed Mostafa, et al.
Published: (2018)
An overview of neural networks use in anomaly intrusion detection systems
by: Sani, Yusuf, et al.
Published: (2009)
by: Sani, Yusuf, et al.
Published: (2009)
An efficient anomaly intrusion detection method with evolutionary neural network
by: Sarvari, Samira
Published: (2020)
by: Sarvari, Samira
Published: (2020)
Advanced statistical methods for detecting the Epoch of Reionisation
by: Cook, Jaiden Hue
Published: (2023)
by: Cook, Jaiden Hue
Published: (2023)
An efficient anomaly intrusion detection method with feature selection and evolutionary neural network
by: Sarvari, Samira, et al.
Published: (2020)
by: Sarvari, Samira, et al.
Published: (2020)
Signature-Based & Anomaly-Based Network & Intrusion Detection System (SBNIDS & ABNIDS)
by: Rene, Chiadighikaobi Ikenna, et al.
Published: (2015)
by: Rene, Chiadighikaobi Ikenna, et al.
Published: (2015)
Anomaly detection in vessel tracking: a Bayesian Networks (BNs) approach
by: Handayani, Dini, et al.
Published: (2015)
by: Handayani, Dini, et al.
Published: (2015)
Dempster-Shafer for Anomaly Detection
by: Chen, Qi, et al.
Published: (2006)
by: Chen, Qi, et al.
Published: (2006)
Dendritic Cells for Anomaly Detection
by: Greensmith, Julie, et al.
Published: (2006)
by: Greensmith, Julie, et al.
Published: (2006)
Detection of Cross-Channel Anomalies
by: Pham, DucSon, et al.
Published: (2012)
by: Pham, DucSon, et al.
Published: (2012)
Traffic Scene Anomaly Detection
by: Lu, Cai An
Published: (2017)
by: Lu, Cai An
Published: (2017)
Anomaly Detection in Time Series Data Using Spiking Neural Network
by: Bariah, Yusob, et al.
Published: (2018)
by: Bariah, Yusob, et al.
Published: (2018)
Statistical significance of geomagnetic diurnal variation anomalies prior to worldwide earthquakes
by: Khairul Adib Yusof,, et al.
Published: (2021)
by: Khairul Adib Yusof,, et al.
Published: (2021)
Statistical significance of geomagnetic diurnal variation anomalies prior to worldwide earthquakes
by: Yusof, Khairul Adib, et al.
Published: (2021)
by: Yusof, Khairul Adib, et al.
Published: (2021)
An efficient anomaly intrusion detection method with evolutionary kernel neural network random weights
by: Sarvari, Samira, et al.
Published: (2020)
by: Sarvari, Samira, et al.
Published: (2020)
Real valued negative selection for anomaly detection in wireless ad hoc networks
by: Abdul Majid, Azri, et al.
Published: (2004)
by: Abdul Majid, Azri, et al.
Published: (2004)
Anomaly Detection Framework for PingER Data
by: Danny Wilson, Mandai, et al.
Published: (2015)
by: Danny Wilson, Mandai, et al.
Published: (2015)
An Immune Inspired Approach to Anomaly Detection
by: Twycross, Jamie, et al.
Published: (2007)
by: Twycross, Jamie, et al.
Published: (2007)
Anomaly detection for vision-based inspection
by: Chew, Yan Zhe
Published: (2022)
by: Chew, Yan Zhe
Published: (2022)
Comparing U-statistic and nonstructural methods for separating anomaly and generating geochemical anomaly maps of Cu and Mo in Parkam district, Kerman, Iran
by: Ghannadpour, Seyed Saeed, et al.
Published: (2017)
by: Ghannadpour, Seyed Saeed, et al.
Published: (2017)
Dendritic Cells for Real-Time Anomaly Detection
by: Greensmith, Julie, et al.
Published: (2006)
by: Greensmith, Julie, et al.
Published: (2006)
Generative Models for Anomaly Detection and Its Applications
by: Yu, Jongmin
Published: (2020)
by: Yu, Jongmin
Published: (2020)
Anomaly detection with Attention-based deep autoencoder
by: Yong, Hong Long
Published: (2022)
by: Yong, Hong Long
Published: (2022)
A refined filter for UHAD to improve anomaly detection
by: Hajamydeen, Asif Iqbal, et al.
Published: (2016)
by: Hajamydeen, Asif Iqbal, et al.
Published: (2016)
Highly efficient distance-based anomaly detection through univariate with PCA in wireless sensor networks
by: Xie, Miao, et al.
Published: (2011)
by: Xie, Miao, et al.
Published: (2011)
Anomaly detection in quadcopter flight: Harnessing frequency domain analysis and barnacle mating optimization
by: Mohd Sharif, Zakaria, et al.
Published: (2025)
by: Mohd Sharif, Zakaria, et al.
Published: (2025)
Similar Items
-
Packet header anomaly detection using statistical analysis
by: Yassin, Warusia, et al.
Published: (2014) -
Iterative window size estimation on self-similarity measurement for network traffic anomaly detection
by: Idris, Mohd. Yazid, et al.
Published: (2004) -
Anomaly network intrusion detection method in network security based on principle component analysis
by: Chimphlee, Witcha, et al.
Published: (2006) -
Host-based packet header anomaly detection using statistical analysis
by: Yassin, Warusia, et al.
Published: (2013) -
Unsupervised Anomaly Detection with Unlabeled Data Using Clustering
by: Chimphlee, Witcha, et al.
Published: (2005)