An Overview Of Flow-Based Anomaly Detection

INTERNATIONAL JOURNAL OF COMMUNICATION NETWORKS AND DISTRIBUTED SYSTEMS(2018)

引用 4|浏览5
暂无评分
摘要
Intrusions in computer networks are handled using misuse or anomaly-based solutions. Deep packet inspection is generally incorporated in solutions for better detection and mitigation but with the growth of networks at exponential speed, it has become an expensive solution and makes real-time detection difficult. In this paper, network flows-based anomaly detection techniques are reviewed. The review starts with motivation behind using network flows and justifies why flow-based anomaly detection is the need of the hour. Flow-based datasets are also investigated and reviewed. The main focus is on techniques and methodologies used by researchers for anomaly detection in computer networks. The techniques reviewed are categorised into five classes: statistical, machine learning, clustering, frequent pattern mining and agent-based. At the end the core research problems and open challenges are discussed.
更多
查看译文
关键词
network flows, anomaly detection, security, privacy, flow-based dataset, statistical techniques, machine learning, clustering, frequent pattern mining, software agents
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要