A comprehensive survey on network anomaly detection

被引:195
作者
Fernandes, Gilberto [1 ]
Rodrigues, Joel J. P. C. [1 ,2 ,3 ,4 ,6 ]
Carvalho, Luiz Fernando [5 ]
Al-Muhtadi, Jalal F. [6 ]
Proenca, Mario Lemes, Jr. [7 ]
机构
[1] Univ Beira Interior, Inst Telecomunicacoes, Covilha, Portugal
[2] Natl Inst Telecommun Inatel, Av Joao de Camargo,510 Ctr, BR-37540000 Santa Rita Do Sapucai, Brazil
[3] ITMO Univ, St Petersburg, Russia
[4] Univ Fortaleza UNIFOR, Fortaleza, Ceara, Brazil
[5] State Univ Campinas UNICAMP, Elect Engn & Telecommun, Campinas, SP, Brazil
[6] KSU, CCIS, Riyadh 12372, Saudi Arabia
[7] Univ Estadual Londrina, Comp Sci Dept, Londrina, Brazil
关键词
Anomaly detection; Network security; Network management; Intrusion detection; Anomaly detection methods; INTRUSION DETECTION SYSTEM; ARTIFICIAL IMMUNE-SYSTEM; FEATURE-SELECTION; COVARIANCE-MATRIX; ATTACK DETECTION; DDOS ATTACKS; INTERNET; HYBRID; PCA; PARAMETER;
D O I
10.1007/s11235-018-0475-8
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Nowadays, there is a huge and growing concern about security in information and communication technology among the scientific community because any attack or anomaly in the network can greatly affect many domains such as national security, private data storage, social welfare, economic issues, and so on. Therefore, the anomaly detection domain is a broad research area, and many different techniques and approaches for this purpose have emerged through the years. In this study, the main objective is to review the most important aspects pertaining to anomaly detection, covering an overview of a background analysis as well as a core study on the most relevant techniques, methods, and systems within the area. Therefore, in order to ease the understanding of this survey's structure, the anomaly detection domain was reviewed under five dimensions: (1) network traffic anomalies, (2) network data types, (3) intrusion detection systems categories, (4) detection methods and systems, and (5) open issues. The paper concludes with an open issues summary discussing presently unsolved problems, and final remarks.
引用
收藏
页码:447 / 489
页数:43
相关论文
共 159 条
[1]   A novel SVM-kNN-PSO ensemble method for intrusion detection system [J].
Aburomman, Abdulla Amin ;
Reaz, Mamun Bin Ibne .
APPLIED SOFT COMPUTING, 2016, 38 :360-372
[2]   Anomaly detection using metaheuristic firefly harmonic clustering [J].
Adaniya, Mario H. A. C. ;
Abrão, Taufik ;
Proença Jr., Mario Lemes .
Journal of Networks, 2013, 8 (01) :82-91
[3]   A survey of network anomaly detection techniques [J].
Ahmed, Mohiuddin ;
Mahmood, Abdun Naser ;
Hu, Jiankun .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2016, 60 :19-31
[4]   Multi-level hybrid support vector machine and extreme learning machine based on modified K-means for intrusion detection system [J].
Al-Yaseen, Wathiq Laftah ;
Othman, Zulaiha Ali ;
Nazri, Mohd Zakree Ahmad .
EXPERT SYSTEMS WITH APPLICATIONS, 2017, 67 :296-303
[5]   Deep IP flow inspection to detect beyond network anomalies [J].
Amaral, Alexandre Aguiar ;
Mendes, Leonardo de Souza ;
Zarpelao, Bruno Bogaz ;
Proenca Junior, Mario Lemes .
COMPUTER COMMUNICATIONS, 2017, 98 :80-96
[6]  
Amer M., 2013, P ACM SIGKDD WORKSH, P8
[7]  
[Anonymous], 2011, NfSen - NetFlow Sensor
[8]  
[Anonymous], 2010, P 14 INT C HARM QUAL
[9]  
[Anonymous], 2016, 2016 IEEE International Conference on Advanced Networks and Telecommunications Systems, DOI DOI 10.1109/ANTS.2016.7947776
[10]  
[Anonymous], 2012, CISC VIS NETW IND GL, P1