Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1109/ISI.2016.7745483guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
research-article

Activity-based temporal anomaly detection in enterprise-cyber security

Published: 01 September 2016 Publication History

Abstract

Statistical anomaly detection is emerging as an important complement to signature-based methods for enterprise network defence. In this paper, we isolate a persistent structure in two different enterprise network data sources. This structure provides the basis of a regression-based anomaly detection method. The procedure is demonstrated on a large public domain data set.

References

[1]
I. Friedberg, F. Skopik, G. Settanni, and R. Fiedler, “Combating advanced persistent threats: From network event correlation to incident detection.” Computers and Security, vol. 48, pp. 35–57, 2015.
[2]
N. Adams and N. Heard, Data analysis for network cyber-security. Imperial College Press, 2014.
[3]
N. Adams, and N. Heard, Dynamic networks and cyber-security. World Scientific 2016.
[4]
A. D. Kent, “Comprehensive, multi-source cyber-security events,” Los Alamos National Laboratory, 2015.
[5]
A. D. Kent, “Cybersecurity data sources for dynamic network research,” in Dynamic Networks in Cybersecurity. World Scientific 2016.
[6]
R. Fisher, Statistical methods for research workers. Oliver and Boyd 1925.
[7]
M. J. M. Turcotte, N. A. Heard, and J. Neil, “Detecting localised anomalous behaviour in a computer network.” in Advances in Intelligent Data Analysis XIII, 2014, pp. 321–332.

Cited By

View all
  • (2023)Euler: Detecting Network Lateral Movement via Scalable Temporal Link PredictionACM Transactions on Privacy and Security10.1145/358877126:3(1-36)Online publication date: 27-Jun-2023

Index Terms

  1. Activity-based temporal anomaly detection in enterprise-cyber security
      Index terms have been assigned to the content through auto-classification.

      Recommendations

      Comments

      Information & Contributors

      Information

      Published In

      cover image Guide Proceedings
      2016 IEEE Conference on Intelligence and Security Informatics (ISI)
      326 pages

      Publisher

      IEEE Press

      Publication History

      Published: 01 September 2016

      Qualifiers

      • Research-article

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)0
      • Downloads (Last 6 weeks)0
      Reflects downloads up to 21 Sep 2024

      Other Metrics

      Citations

      Cited By

      View all
      • (2023)Euler: Detecting Network Lateral Movement via Scalable Temporal Link PredictionACM Transactions on Privacy and Security10.1145/358877126:3(1-36)Online publication date: 27-Jun-2023

      View Options

      View options

      Get Access

      Login options

      Media

      Figures

      Other

      Tables

      Share

      Share

      Share this Publication link

      Share on social media