Skip to main content
Top
Published in:
Cover of the book

2017 | Supplement | Chapter

1. Introduction

Authors : Monowar H. Bhuyan, Dhruba K. Bhattacharyya, Jugal K. Kalita

Published in: Network Traffic Anomaly Detection and Prevention

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

With advances in network technologies, the variety and volume, Internet services that are provided by commercial, nonprofit or governmental organizations undergo constant growth, causing commensurate and often exposure expansion in network traffic.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Aydin, M.A., Zaim, A.H., Ceylan, K.G.: A hybrid intrusion detection system design for computer network security. Comput. Electr. Eng. 35(3), 517–526 (2009)CrossRefMATH Aydin, M.A., Zaim, A.H., Ceylan, K.G.: A hybrid intrusion detection system design for computer network security. Comput. Electr. Eng. 35(3), 517–526 (2009)CrossRefMATH
2.
go back to reference Bace, R., Mell, P.: Intrusion detection systems. Tech. Rep. SP800-31, NIST Special Publications, US Department of Defence, USA (2001) Bace, R., Mell, P.: Intrusion detection systems. Tech. Rep. SP800-31, NIST Special Publications, US Department of Defence, USA (2001)
3.
go back to reference Burbeck, K., Nadjm-Tehrani, S.: Adaptive real-time anomaly detection with incremental clustering. Information Security Technical Report 12(1), 56–67 (2007)CrossRef Burbeck, K., Nadjm-Tehrani, S.: Adaptive real-time anomaly detection with incremental clustering. Information Security Technical Report 12(1), 56–67 (2007)CrossRef
4.
go back to reference Casas, P., Mazel, J., Owezarski, P.: Unsupervised network intrusion detection systems: detecting the unknown without knowledge. Comput. Commun. 35(7), 772–783 (2012)CrossRef Casas, P., Mazel, J., Owezarski, P.: Unsupervised network intrusion detection systems: detecting the unknown without knowledge. Comput. Commun. 35(7), 772–783 (2012)CrossRef
5.
go back to reference Chandola, V., Banerjee, A., Kumar, V.: Anomaly detection: a survey. ACM Comput. Surv. 41(3), 1–58 (2009)CrossRef Chandola, V., Banerjee, A., Kumar, V.: Anomaly detection: a survey. ACM Comput. Surv. 41(3), 1–58 (2009)CrossRef
6.
go back to reference David, S.T.: Network intrusion prevention systems: signature-based and anomaly detection. Ph.D. thesis, The Hebrew University of Jerusalem, April (2011) David, S.T.: Network intrusion prevention systems: signature-based and anomaly detection. Ph.D. thesis, The Hebrew University of Jerusalem, April (2011)
7.
go back to reference Erman, J., Mahanti, A., Arlitt, M., Cohen, I., Williamson, C.: Semi-supervised network traffic classification. SIGMETRICS Perform. Eval. Rev. 35(1), 369–370 (2007)CrossRef Erman, J., Mahanti, A., Arlitt, M., Cohen, I., Williamson, C.: Semi-supervised network traffic classification. SIGMETRICS Perform. Eval. Rev. 35(1), 369–370 (2007)CrossRef
9.
go back to reference Jiang, S., Song, X., Wang, H., Han, J.J., Li, Q.H.: A clustering-based method for unsupervised intrusion detections. Pattern Recogn. Lett. 27(7), 802–810 (2006)CrossRef Jiang, S., Song, X., Wang, H., Han, J.J., Li, Q.H.: A clustering-based method for unsupervised intrusion detections. Pattern Recogn. Lett. 27(7), 802–810 (2006)CrossRef
10.
go back to reference Khreich, W., Granger, E., Miri, A., Sabourin, R.: Adaptive ROC-based ensembles of HMMs applied to anomaly detection. Pattern Recogn. 45(1), 208–230 (2012)CrossRefMATH Khreich, W., Granger, E., Miri, A., Sabourin, R.: Adaptive ROC-based ensembles of HMMs applied to anomaly detection. Pattern Recogn. 45(1), 208–230 (2012)CrossRefMATH
11.
go back to reference Kumar, V.: Parallel and distributed computing for cybersecurity. IEEE Distrib. Syst. Online 6(10) (2005) Kumar, V.: Parallel and distributed computing for cybersecurity. IEEE Distrib. Syst. Online 6(10) (2005)
12.
go back to reference Laskov, P., Gehl, C., Krüger, S., Müller, K.R.: Incremental support vector learning: analysis, implementation and applications. J. Mach. Learn. Res. 7, 1909–1936 (2006)MathSciNetMATH Laskov, P., Gehl, C., Krüger, S., Müller, K.R.: Incremental support vector learning: analysis, implementation and applications. J. Mach. Learn. Res. 7, 1909–1936 (2006)MathSciNetMATH
15.
go back to reference Patcha, A., Park, J.M.: An overview of anomaly detection techniques: existing solutions and latest technological trends. Comput. Netw. 51(12), 3448–3470 (2007)CrossRef Patcha, A., Park, J.M.: An overview of anomaly detection techniques: existing solutions and latest technological trends. Comput. Netw. 51(12), 3448–3470 (2007)CrossRef
16.
go back to reference Shimonski, R.: The Wireshark field guide: analyzing and troubleshooting network traffic. Syngress Media, U.S. (2013) Shimonski, R.: The Wireshark field guide: analyzing and troubleshooting network traffic. Syngress Media, U.S. (2013)
18.
go back to reference Su, M.Y.: Using clustering to improve the KNN-based classifiers for online anomaly network traffic identification. J. Netw. Comput. Appl. 34(2), 722–730 (2011)CrossRef Su, M.Y.: Using clustering to improve the KNN-based classifiers for online anomaly network traffic identification. J. Netw. Comput. Appl. 34(2), 722–730 (2011)CrossRef
19.
go back to reference Tan, P.N., Steinbach, M., Kumar, V.: Introduction to Data Mining, 4th edn. Addison-Wesley, Pearson Education, India (2009) Tan, P.N., Steinbach, M., Kumar, V.: Introduction to Data Mining, 4th edn. Addison-Wesley, Pearson Education, India (2009)
20.
go back to reference Tanenbaum, A.: Computer Networks. Prentice Hall Professional Technical Reference, 4th edn. Prentice Hall, Pearson Education, India (2002) Tanenbaum, A.: Computer Networks. Prentice Hall Professional Technical Reference, 4th edn. Prentice Hall, Pearson Education, India (2002)
21.
go back to reference Thottan, M., Ji, C.: Anomaly detection in IP networks. IEEE Trans. Signal Process. 51(8), 2191–2204 (2003)CrossRef Thottan, M., Ji, C.: Anomaly detection in IP networks. IEEE Trans. Signal Process. 51(8), 2191–2204 (2003)CrossRef
22.
go back to reference Toosi, A.N., Kahani, M.: A new approach to intrusion detection based on an evolutionary soft computing model using Neuro-fuzzy classifiers. Comput. Commun. 30(10), 2201–2212 (2007)CrossRef Toosi, A.N., Kahani, M.: A new approach to intrusion detection based on an evolutionary soft computing model using Neuro-fuzzy classifiers. Comput. Commun. 30(10), 2201–2212 (2007)CrossRef
23.
go back to reference Wood, P., Egan, G., Haley, K., Tran, T., Cox, O.: Internet security threat report. Tech. Rep. 17, Symantec, USA (2012) Wood, P., Egan, G., Haley, K., Tran, T., Cox, O.: Internet security threat report. Tech. Rep. 17, Symantec, USA (2012)
24.
go back to reference Wu, S.X., Banzhaf, W.: The use of computational intelligence in intrusion detection systems: a review. Appl. Soft Comput. 10(1), 1–35 (2010)CrossRef Wu, S.X., Banzhaf, W.: The use of computational intelligence in intrusion detection systems: a review. Appl. Soft Comput. 10(1), 1–35 (2010)CrossRef
25.
go back to reference Yi, Y., Wu, J., Xu, W.: Incremental SVM based on reserved set for network intrusion detection. Expert Syst. Appl. 38(6), 7698–7707 (2011)CrossRef Yi, Y., Wu, J., Xu, W.: Incremental SVM based on reserved set for network intrusion detection. Expert Syst. Appl. 38(6), 7698–7707 (2011)CrossRef
26.
go back to reference Zhang, J., Chen, C., Xiang, Y., Zhou, W.: Semi-supervised and compound classification of network traffic. In: Proceedings of the 32nd International Conference on Distributed Computing Systems Workshops, pp. 617–621 (2012). doi:10.1109/ICDCSW.2012.12 Zhang, J., Chen, C., Xiang, Y., Zhou, W.: Semi-supervised and compound classification of network traffic. In: Proceedings of the 32nd International Conference on Distributed Computing Systems Workshops, pp. 617–621 (2012). doi:​10.​1109/​ICDCSW.​2012.​12
27.
go back to reference Zhang, J., Zulkernine, M.: A hybrid network intrusion detection technique using random forests. In: Proceedings of the 1st International Conference on Availability, Reliability and Security, pp. 262–269. IEEE, CS, USA (2006). doi:10.1109/ARES.2006.7 Zhang, J., Zulkernine, M.: A hybrid network intrusion detection technique using random forests. In: Proceedings of the 1st International Conference on Availability, Reliability and Security, pp. 262–269. IEEE, CS, USA (2006). doi:​10.​1109/​ARES.​2006.​7
Metadata
Title
Introduction
Authors
Monowar H. Bhuyan
Dhruba K. Bhattacharyya
Jugal K. Kalita
Copyright Year
2017
DOI
https://doi.org/10.1007/978-3-319-65188-0_1

Premium Partner