Loading…
Survey on Incremental Approaches for Network Anomaly Detection
As the communication industry has connected distant corners of the globe using advances in network technology, intruders or attackers have also increased attacks on networking infrastructure commensurately. System administrators can attempt to prevent such attacks using intrusion detection tools an...
Saved in:
Published in: | International journal of communication networks and information security 2011-12, Vol.3 (3), p.226 |
---|---|
Main Author: | |
Format: | Article |
Language: | English |
Subjects: | |
Online Access: | Get full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
cited_by | |
---|---|
cites | |
container_end_page | |
container_issue | 3 |
container_start_page | 226 |
container_title | International journal of communication networks and information security |
container_volume | 3 |
creator | J K Kalita, M. Hussain Bhuyan, D K Bhattacharyya |
description | As the communication industry has connected distant corners of the globe using advances in network technology, intruders or attackers have also increased attacks on networking infrastructure commensurately. System administrators can attempt to prevent such attacks using intrusion detection tools and systems. There are many commercially available signature-based Intrusion Detection Systems (IDSs). However, most IDSs lack the capability to detect novel or previously unknown attacks. A special type of IDSs, called Anomaly Detection Systems, develop models based on normal system or network behavior, with the goal of detecting both known and unknown attacks. Anomaly detection systems face many problems including high rate of false alarm, ability to work in online mode, and scalability. This paper presents a selective survey of incremental approaches for detecting anomaly in normal system or network traffic. The technological trends, open problems, and challenges over anomaly detection using incremental approach are also discussed. |
doi_str_mv | 10.17762/ijcnis.v3i3.104 |
format | article |
fullrecord | <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_922065344</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2589357981</sourcerecordid><originalsourceid>FETCH-LOGICAL-c138t-299b77208e2b89ba08a45fbb953d9b7a0e8e2e04112faf48815005d178148b9f3</originalsourceid><addsrcrecordid>eNotkM1LAzEQxYMoWKt3j8H71snHbpKLUKrVQtGDCt5CdjvBrW1Sk22l_71r62mGeY_3hh8h1wxGTKmK37bLJrR5tBOtGDGQJ2TAQYmiAvVxetirAoyAc3KR8xKgqgDMgNy9btMO9zQGOgtNwjWGzq3oeLNJ0TWfmKmPiT5j9xPTFx2HuHarPb3HDpuujeGSnHm3ynj1P4fkffrwNnkq5i-Ps8l4XjRM6K7gxtRKcdDIa21qB9rJ0te1KcWiVxxgryBIxrh3XmrNSoBywZRmUtfGiyG5Oeb2b31vMXd2Gbcp9JXWcA5VKaTsTXA0NSnmnNDbTWrXLu0tA3uAZI-Q7B-k_ijFL0NsW-I</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>922065344</pqid></control><display><type>article</type><title>Survey on Incremental Approaches for Network Anomaly Detection</title><source>Freely Accessible Journals</source><creator>J K Kalita, M. Hussain Bhuyan, D K Bhattacharyya</creator><creatorcontrib>J K Kalita, M. Hussain Bhuyan, D K Bhattacharyya</creatorcontrib><description> As the communication industry has connected distant corners of the globe using advances in network technology, intruders or attackers have also increased attacks on networking infrastructure commensurately. System administrators can attempt to prevent such attacks using intrusion detection tools and systems. There are many commercially available signature-based Intrusion Detection Systems (IDSs). However, most IDSs lack the capability to detect novel or previously unknown attacks. A special type of IDSs, called Anomaly Detection Systems, develop models based on normal system or network behavior, with the goal of detecting both known and unknown attacks. Anomaly detection systems face many problems including high rate of false alarm, ability to work in online mode, and scalability. This paper presents a selective survey of incremental approaches for detecting anomaly in normal system or network traffic. The technological trends, open problems, and challenges over anomaly detection using incremental approach are also discussed.</description><identifier>ISSN: 2076-0930</identifier><identifier>ISSN: 2073-607X</identifier><identifier>EISSN: 2073-607X</identifier><identifier>EISSN: 2076-0930</identifier><identifier>DOI: 10.17762/ijcnis.v3i3.104</identifier><language>eng</language><publisher>Kohat: Kohat University of Science and Technology (KUST)</publisher><subject>Computer networks ; Data mining ; Network security ; Neural networks</subject><ispartof>International journal of communication networks and information security, 2011-12, Vol.3 (3), p.226</ispartof><rights>Copyright Kohat University of Science and Technology (KUST) Dec 2011</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,780,784,27923,27924</link.rule.ids></links><search><creatorcontrib>J K Kalita, M. Hussain Bhuyan, D K Bhattacharyya</creatorcontrib><title>Survey on Incremental Approaches for Network Anomaly Detection</title><title>International journal of communication networks and information security</title><description> As the communication industry has connected distant corners of the globe using advances in network technology, intruders or attackers have also increased attacks on networking infrastructure commensurately. System administrators can attempt to prevent such attacks using intrusion detection tools and systems. There are many commercially available signature-based Intrusion Detection Systems (IDSs). However, most IDSs lack the capability to detect novel or previously unknown attacks. A special type of IDSs, called Anomaly Detection Systems, develop models based on normal system or network behavior, with the goal of detecting both known and unknown attacks. Anomaly detection systems face many problems including high rate of false alarm, ability to work in online mode, and scalability. This paper presents a selective survey of incremental approaches for detecting anomaly in normal system or network traffic. The technological trends, open problems, and challenges over anomaly detection using incremental approach are also discussed.</description><subject>Computer networks</subject><subject>Data mining</subject><subject>Network security</subject><subject>Neural networks</subject><issn>2076-0930</issn><issn>2073-607X</issn><issn>2073-607X</issn><issn>2076-0930</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2011</creationdate><recordtype>article</recordtype><recordid>eNotkM1LAzEQxYMoWKt3j8H71snHbpKLUKrVQtGDCt5CdjvBrW1Sk22l_71r62mGeY_3hh8h1wxGTKmK37bLJrR5tBOtGDGQJ2TAQYmiAvVxetirAoyAc3KR8xKgqgDMgNy9btMO9zQGOgtNwjWGzq3oeLNJ0TWfmKmPiT5j9xPTFx2HuHarPb3HDpuujeGSnHm3ynj1P4fkffrwNnkq5i-Ps8l4XjRM6K7gxtRKcdDIa21qB9rJ0te1KcWiVxxgryBIxrh3XmrNSoBywZRmUtfGiyG5Oeb2b31vMXd2Gbcp9JXWcA5VKaTsTXA0NSnmnNDbTWrXLu0tA3uAZI-Q7B-k_ijFL0NsW-I</recordid><startdate>20111219</startdate><enddate>20111219</enddate><creator>J K Kalita, M. Hussain Bhuyan, D K Bhattacharyya</creator><general>Kohat University of Science and Technology (KUST)</general><scope>AAYXX</scope><scope>CITATION</scope><scope>3V.</scope><scope>4T-</scope><scope>4U-</scope><scope>7RQ</scope><scope>7XB</scope><scope>88F</scope><scope>88I</scope><scope>88K</scope><scope>8AL</scope><scope>8FE</scope><scope>8FG</scope><scope>8FK</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>GNUQQ</scope><scope>HCIFZ</scope><scope>JQ2</scope><scope>K7-</scope><scope>M0N</scope><scope>M1Q</scope><scope>M2P</scope><scope>M2T</scope><scope>P5Z</scope><scope>P62</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PRINS</scope><scope>Q9U</scope><scope>U9A</scope></search><sort><creationdate>20111219</creationdate><title>Survey on Incremental Approaches for Network Anomaly Detection</title><author>J K Kalita, M. Hussain Bhuyan, D K Bhattacharyya</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c138t-299b77208e2b89ba08a45fbb953d9b7a0e8e2e04112faf48815005d178148b9f3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2011</creationdate><topic>Computer networks</topic><topic>Data mining</topic><topic>Network security</topic><topic>Neural networks</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>J K Kalita, M. Hussain Bhuyan, D K Bhattacharyya</creatorcontrib><collection>CrossRef</collection><collection>ProQuest Central (Corporate)</collection><collection>Docstoc</collection><collection>University Readers</collection><collection>Career & Technical Education Database</collection><collection>ProQuest Central (purchase pre-March 2016)</collection><collection>Military Database (Alumni Edition)</collection><collection>Science Database (Alumni Edition)</collection><collection>Telecommunications (Alumni Edition)</collection><collection>Computing Database (Alumni Edition)</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>ProQuest Central (Alumni) (purchase pre-March 2016)</collection><collection>ProQuest Central (Alumni)</collection><collection>ProQuest Central</collection><collection>Advanced Technologies & Aerospace Collection</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central</collection><collection>ProQuest Central Student</collection><collection>SciTech Premium Collection</collection><collection>ProQuest Computer Science Collection</collection><collection>Computer Science Database</collection><collection>Computing Database</collection><collection>Military Database</collection><collection>Science Database</collection><collection>Telecommunications Database</collection><collection>Advanced Technologies & Aerospace Database</collection><collection>ProQuest Advanced Technologies & Aerospace Collection</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central China</collection><collection>ProQuest Central Basic</collection><jtitle>International journal of communication networks and information security</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>J K Kalita, M. Hussain Bhuyan, D K Bhattacharyya</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Survey on Incremental Approaches for Network Anomaly Detection</atitle><jtitle>International journal of communication networks and information security</jtitle><date>2011-12-19</date><risdate>2011</risdate><volume>3</volume><issue>3</issue><spage>226</spage><pages>226-</pages><issn>2076-0930</issn><issn>2073-607X</issn><eissn>2073-607X</eissn><eissn>2076-0930</eissn><abstract> As the communication industry has connected distant corners of the globe using advances in network technology, intruders or attackers have also increased attacks on networking infrastructure commensurately. System administrators can attempt to prevent such attacks using intrusion detection tools and systems. There are many commercially available signature-based Intrusion Detection Systems (IDSs). However, most IDSs lack the capability to detect novel or previously unknown attacks. A special type of IDSs, called Anomaly Detection Systems, develop models based on normal system or network behavior, with the goal of detecting both known and unknown attacks. Anomaly detection systems face many problems including high rate of false alarm, ability to work in online mode, and scalability. This paper presents a selective survey of incremental approaches for detecting anomaly in normal system or network traffic. The technological trends, open problems, and challenges over anomaly detection using incremental approach are also discussed.</abstract><cop>Kohat</cop><pub>Kohat University of Science and Technology (KUST)</pub><doi>10.17762/ijcnis.v3i3.104</doi></addata></record> |
fulltext | fulltext |
identifier | ISSN: 2076-0930 |
ispartof | International journal of communication networks and information security, 2011-12, Vol.3 (3), p.226 |
issn | 2076-0930 2073-607X 2073-607X 2076-0930 |
language | eng |
recordid | cdi_proquest_journals_922065344 |
source | Freely Accessible Journals |
subjects | Computer networks Data mining Network security Neural networks |
title | Survey on Incremental Approaches for Network Anomaly Detection |
url | http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-09T09%3A10%3A44IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Survey%20on%20Incremental%20Approaches%20for%20Network%20Anomaly%20Detection&rft.jtitle=International%20journal%20of%20communication%20networks%20and%20information%20security&rft.au=J%20K%20Kalita,%20M.%20Hussain%20Bhuyan,%20D%20K%20Bhattacharyya&rft.date=2011-12-19&rft.volume=3&rft.issue=3&rft.spage=226&rft.pages=226-&rft.issn=2076-0930&rft.eissn=2073-607X&rft_id=info:doi/10.17762/ijcnis.v3i3.104&rft_dat=%3Cproquest_cross%3E2589357981%3C/proquest_cross%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-c138t-299b77208e2b89ba08a45fbb953d9b7a0e8e2e04112faf48815005d178148b9f3%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_pqid=922065344&rft_id=info:pmid/&rfr_iscdi=true |