Network anomaly detection research: a survey

Published on Mar 25, 2019in Indonesian Journal of Electrical Engineering and Informatics
路 DOI :10.11591/IJEEI.V7I1.773
Kurniabudi Kurniabudi , Benni Purnama3
Estimated H-index: 3
+ 5 AuthorsRahmat Budiarto13
Estimated H-index: 13
(Al Baha University)
Source
Abstract
Data analysis to identifying attacks/anomalies is a crucial task in anomaly detection and network anomaly detection itself is an important issue in network security. Researchers have developed methods and algorithms for the improvement of the anomaly detection system. At the same time, survey papers on anomaly detection researches are available. Nevertheless, this paper attempts to analyze futher and to provide alternative taxonomy on anomaly detection researches focusing on methods, types of anomalies, data repositories, outlier identity and the most used data type. In addition, this paper summarizes information on application network categories of the existing studies .
Figures & Tables
Download
馃摉 Papers frequently viewed together
2009
1 Author (Ren Wei-wu)
3 Citations
References0
Newest
Cited By5
Newest
#1Geeta Kocher (PTU: Punjab Technical University)
#2Gulshan Kumar (Shaheed Bhagat Singh State Technical Campus)H-Index: 11
Deep learning (DL) is gaining significant prevalence in every field of study due to its domination in training large data sets. However, several applications are utilizing machine learning (ML) methods from the past several years and reported good performance. However, their limitations in terms of data complexity give rise to DL methods. Intrusion detection is one of the prominent areas in which researchers are extending DL methods. Even though several excellent surveys cover the growing body o...
Source
#1Bhanu Chander (Pondicherry University)H-Index: 1
#2G. Kumaravelan (Pondicherry University)H-Index: 2
Abstract Wireless Sensor Networks (WSNs) are developed significantly from the last decades and attracted the attention of scientific and industrial domains. In WSNs, sensor nodes distributed autonomously in harsh environments are easily vulnerable to faults and attacks that cause sensor readings unreliable and inaccurate. In this scenario, sensor readings that have differed considerably from healthy behaviors will be considered abnormal data or anomalies/outliers. The inclusion of such outliers ...
Source
This thesis examines the use of Principal Component Analysis, Robust Principal Component Analysis, and simple autoencoders for dimension reduction on a synthetic cybersecurity dataset. Each is tested as a precur- sor to Independent Component Analysis. Stable independent components are obtained by iterative random- ized starts to FastICA and selecting the centroids of the hierarchically clustered components. A density-based clustering method is then applied to the results with the goal of isolati...
#1Sheraz NaseerH-Index: 6
#2Rao Faizan AliH-Index: 3
Last. Yasir SaleemH-Index: 15
view all 4 authors...
Oil and Gas organizations are dependent on their IT infrastructure, which is a small part of their industrial automation infrastructure, to function effectively. The oil and gas (O&G) organizations industrial automation infrastructure landscape is complex. To perform focused and effective studies, Industrial systems infrastructure is divided into functional levels by The Instrumentation, Systems and Automation Society (ISA) Standard ANSI/ISA-95:2005. This research focuses on the ISA-95:2005 leve...
5 CitationsSource
#1Dominik Widhalm (University of Applied Sciences Technikum Wien)H-Index: 2
#2Karl M. Goeschka (University of Applied Sciences Technikum Wien)
Last. Wolfgang Kastner (TU Wien: Vienna University of Technology)H-Index: 26
view all 3 authors...
Wireless sensor networks play an important role in today's world: When measuring physical conditions, the quality of the sensor readings ultimately impacts the quality of various data analytical services. To maintain data correctness and quality, run-time measures such as anomaly detection techniques are gaining significance. In particular, the detection of threatening node anomalies caused by sensor node faults has become a crucial task.The detection of faulty sensor nodes is a non-trivial task...
Source