Approaches for Anomaly Detection in Network : A Survey

被引:0
作者
Sawant, Anuja A. [1 ]
Game, Pravin S. [1 ]
机构
[1] Pune Inst Comp Technol, Dept Comp Engn, Pune, Maharashtra, India
来源
2018 FOURTH INTERNATIONAL CONFERENCE ON COMPUTING COMMUNICATION CONTROL AND AUTOMATION (ICCUBEA) | 2018年
关键词
Anomaly detection; Classification; Clustering; Feature selection; network communication;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In recent years there is a constant rise in cyber attacks. These attacks affect not only the individuals but the organizations at large also. To detect these attacks requires high-end systems, since there is continuous flow of data to-and-from the network. This huge data flow makes it difficult to analyze traffic and identify anomalous communication. Rule based engines are capable of identifying sophisticated attacks, but it fails to identify unknown and new attacks as the rules are always based on prior knowledge of the administrators. It is virtually impossible to code all the rules beforehand that may capture all the attacks. Most of the attacks have common characteristics, i.e. abnormal or anomalous network communication, authentication attempts or access attempts on objects. This work surveys different approaches to detect anomalies in network communication.
引用
收藏
页数:6
相关论文
共 33 条
[1]  
Abdel-Aziz AS, 2013, COMM COM INF SC, V381, P219
[2]  
Abid A., 2015, 2015 12 INT MULT C S, P1
[3]   Survey on Anomaly Detection using Data Mining Techniques [J].
Agrawal, Shikha ;
Agrawal, Jitendra .
KNOWLEDGE-BASED AND INTELLIGENT INFORMATION & ENGINEERING SYSTEMS 19TH ANNUAL CONFERENCE, KES-2015, 2015, 60 :708-713
[4]  
Akoglu L., 2012, 21 ACM INT C INF KNO, P1
[5]  
Anderson R., 2003, SECURITY ENG GUIDE B, P325
[6]  
Andropov S, 2017, PROC CONF OPEN INNOV, P26, DOI 10.23919/FRUCT.2017.8071288
[7]  
[Anonymous], 2010, P 14 INT C HARM QUAL
[8]  
Aziz ASA, 2013, 2013 13TH INTERNATIONAL CONFERENCE ON HYBRID INTELLIGENT SYSTEMS (HIS), P215, DOI 10.1109/HIS.2013.6920485
[9]   Anomaly detection from log files using data mining techniques [J].
Breier, Jakub ;
Branišová, Jana .
Lecture Notes in Electrical Engineering, 2015, 339 :449-457
[10]   Unsupervised Network Intrusion Detection Systems: Detecting the Unknown without Knowledge [J].
Casas, Pedro ;
Mazel, Johan ;
Owezarski, Philippe .
COMPUTER COMMUNICATIONS, 2012, 35 (07) :772-783