Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
research-article

Network intrusion and fault detection: a statistical anomaly approach

Published: 01 October 2002 Publication History

Abstract

With the advent and explosive growth of the global Internet and electronic commerce environments, adaptive/automatic network/service intrusion and anomaly detection in wide area data networks and e-commerce infrastructures is fast gaining critical research and practical importance. We present and demonstrate the use of a general-purpose hierarchical multitier multiwindow statistical anomaly detection technology and system that operates automatically, adaptively, and proactively, and can be applied to various networking technologies, including both wired and wireless ad hoc networks. Our method uses statistical models and multivariate classifiers to detect anomalous network conditions. Some numerical results are also presented that demonstrate that our proposed methodology can reliably detect attacks with traffic anomaly intensity as low as 3-5 percent of the typical background traffic intensity, thus promising to generate an effective early warning.

Cited By

View all
  • (2023)A Deep Reinforcement Learning-based DDoS Attack Mitigation Scheme for Securing Big Data in Fog-Assisted Cloud EnvironmentWireless Personal Communications: An International Journal10.1007/s11277-023-10407-2130:4(2869-2886)Online publication date: 26-Apr-2023
  • (2021)Design and Development of an Efficient Network Intrusion Detection System Using Machine Learning TechniquesWireless Communications & Mobile Computing10.1155/2021/99742702021Online publication date: 1-Jan-2021
  • (2021)On implementing a powerful intrusion prevention system focused on big dataThe Journal of Supercomputing10.1007/s11227-021-03856-877:12(14039-14052)Online publication date: 1-Dec-2021
  • Show More Cited By

Index Terms

  1. Network intrusion and fault detection: a statistical anomaly approach
      Index terms have been assigned to the content through auto-classification.

      Recommendations

      Comments

      Information & Contributors

      Information

      Published In

      cover image IEEE Communications Magazine
      IEEE Communications Magazine  Volume 40, Issue 10
      October 2002
      102 pages

      Publisher

      IEEE Press

      Publication History

      Published: 01 October 2002

      Qualifiers

      • Research-article

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)0
      • Downloads (Last 6 weeks)0
      Reflects downloads up to 01 Sep 2024

      Other Metrics

      Citations

      Cited By

      View all
      • (2023)A Deep Reinforcement Learning-based DDoS Attack Mitigation Scheme for Securing Big Data in Fog-Assisted Cloud EnvironmentWireless Personal Communications: An International Journal10.1007/s11277-023-10407-2130:4(2869-2886)Online publication date: 26-Apr-2023
      • (2021)Design and Development of an Efficient Network Intrusion Detection System Using Machine Learning TechniquesWireless Communications & Mobile Computing10.1155/2021/99742702021Online publication date: 1-Jan-2021
      • (2021)On implementing a powerful intrusion prevention system focused on big dataThe Journal of Supercomputing10.1007/s11227-021-03856-877:12(14039-14052)Online publication date: 1-Dec-2021
      • (2021)A two-stage Bayesian semiparametric model for novelty detection with robust prior informationStatistics and Computing10.1007/s11222-021-10017-731:4Online publication date: 1-Jul-2021
      • (2020)Game Theoretical Method for Anomaly-Based Intrusion DetectionSecurity and Communication Networks10.1155/2020/88241632020Online publication date: 1-Jan-2020
      • (2019)Security Monitoring of IoT Communication Using FlowsProceedings of the 6th Conference on the Engineering of Computer Based Systems10.1145/3352700.3352718(1-9)Online publication date: 2-Sep-2019
      • (2019)DAD-MCNNProceedings of the 2019 11th International Conference on Machine Learning and Computing10.1145/3318299.3318329(484-488)Online publication date: 22-Feb-2019
      • (2018)Anomaly Detection Methods for IIoT Networks2018 IEEE International Conference on Service Operations and Logistics, and Informatics (SOLI)10.1109/SOLI.2018.8476769(214-219)Online publication date: 31-Jul-2018
      • (2018)Multi-source fusion-based security detection method for heterogeneous networksComputers and Security10.1016/j.cose.2018.01.00374:C(55-70)Online publication date: 1-May-2018
      • (2017)A change-point DDoS attack detection method based on half interaction anomaly degreeInternational Journal of Autonomous and Adaptive Communications Systems10.1504/IJAACS.2017.08273710:1(38-54)Online publication date: 1-Jan-2017
      • Show More Cited By

      View Options

      View options

      Get Access

      Login options

      Media

      Figures

      Other

      Tables

      Share

      Share

      Share this Publication link

      Share on social media