Loading…

Survey on Incremental Approaches for Network Anomaly Detection

 As the communication industry has connected distant corners of the globe using advances in network technology, intruders or attackers have also increased attacks on networking infrastructure commensurately. System administrators can attempt to prevent such attacks using intrusion detection tools an...

Full description

Saved in:
Bibliographic Details
Published in:International journal of communication networks and information security 2011-12, Vol.3 (3), p.226
Main Author: J K Kalita, M. Hussain Bhuyan, D K Bhattacharyya
Format: Article
Language:English
Subjects:
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
cited_by
cites
container_end_page
container_issue 3
container_start_page 226
container_title International journal of communication networks and information security
container_volume 3
creator J K Kalita, M. Hussain Bhuyan, D K Bhattacharyya
description  As the communication industry has connected distant corners of the globe using advances in network technology, intruders or attackers have also increased attacks on networking infrastructure commensurately. System administrators can attempt to prevent such attacks using intrusion detection tools and systems. There are many commercially available signature-based Intrusion Detection Systems (IDSs). However, most IDSs lack the capability to detect novel or previously unknown attacks. A special type of IDSs, called Anomaly Detection Systems, develop models based on normal system or network behavior, with the goal of detecting both known and unknown attacks. Anomaly detection systems face many problems including high rate of false alarm, ability to work in online mode, and scalability. This paper presents a selective survey of incremental approaches for detecting anomaly in normal system or network traffic. The technological trends, open problems, and challenges over anomaly detection using incremental approach are also discussed.
doi_str_mv 10.17762/ijcnis.v3i3.104
format article
fullrecord <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_922065344</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2589357981</sourcerecordid><originalsourceid>FETCH-LOGICAL-c138t-299b77208e2b89ba08a45fbb953d9b7a0e8e2e04112faf48815005d178148b9f3</originalsourceid><addsrcrecordid>eNotkM1LAzEQxYMoWKt3j8H71snHbpKLUKrVQtGDCt5CdjvBrW1Sk22l_71r62mGeY_3hh8h1wxGTKmK37bLJrR5tBOtGDGQJ2TAQYmiAvVxetirAoyAc3KR8xKgqgDMgNy9btMO9zQGOgtNwjWGzq3oeLNJ0TWfmKmPiT5j9xPTFx2HuHarPb3HDpuujeGSnHm3ynj1P4fkffrwNnkq5i-Ps8l4XjRM6K7gxtRKcdDIa21qB9rJ0te1KcWiVxxgryBIxrh3XmrNSoBywZRmUtfGiyG5Oeb2b31vMXd2Gbcp9JXWcA5VKaTsTXA0NSnmnNDbTWrXLu0tA3uAZI-Q7B-k_ijFL0NsW-I</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>922065344</pqid></control><display><type>article</type><title>Survey on Incremental Approaches for Network Anomaly Detection</title><source>Freely Accessible Journals</source><creator>J K Kalita, M. Hussain Bhuyan, D K Bhattacharyya</creator><creatorcontrib>J K Kalita, M. Hussain Bhuyan, D K Bhattacharyya</creatorcontrib><description> As the communication industry has connected distant corners of the globe using advances in network technology, intruders or attackers have also increased attacks on networking infrastructure commensurately. System administrators can attempt to prevent such attacks using intrusion detection tools and systems. There are many commercially available signature-based Intrusion Detection Systems (IDSs). However, most IDSs lack the capability to detect novel or previously unknown attacks. A special type of IDSs, called Anomaly Detection Systems, develop models based on normal system or network behavior, with the goal of detecting both known and unknown attacks. Anomaly detection systems face many problems including high rate of false alarm, ability to work in online mode, and scalability. This paper presents a selective survey of incremental approaches for detecting anomaly in normal system or network traffic. The technological trends, open problems, and challenges over anomaly detection using incremental approach are also discussed.</description><identifier>ISSN: 2076-0930</identifier><identifier>ISSN: 2073-607X</identifier><identifier>EISSN: 2073-607X</identifier><identifier>EISSN: 2076-0930</identifier><identifier>DOI: 10.17762/ijcnis.v3i3.104</identifier><language>eng</language><publisher>Kohat: Kohat University of Science and Technology (KUST)</publisher><subject>Computer networks ; Data mining ; Network security ; Neural networks</subject><ispartof>International journal of communication networks and information security, 2011-12, Vol.3 (3), p.226</ispartof><rights>Copyright Kohat University of Science and Technology (KUST) Dec 2011</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,780,784,27923,27924</link.rule.ids></links><search><creatorcontrib>J K Kalita, M. Hussain Bhuyan, D K Bhattacharyya</creatorcontrib><title>Survey on Incremental Approaches for Network Anomaly Detection</title><title>International journal of communication networks and information security</title><description> As the communication industry has connected distant corners of the globe using advances in network technology, intruders or attackers have also increased attacks on networking infrastructure commensurately. System administrators can attempt to prevent such attacks using intrusion detection tools and systems. There are many commercially available signature-based Intrusion Detection Systems (IDSs). However, most IDSs lack the capability to detect novel or previously unknown attacks. A special type of IDSs, called Anomaly Detection Systems, develop models based on normal system or network behavior, with the goal of detecting both known and unknown attacks. Anomaly detection systems face many problems including high rate of false alarm, ability to work in online mode, and scalability. This paper presents a selective survey of incremental approaches for detecting anomaly in normal system or network traffic. The technological trends, open problems, and challenges over anomaly detection using incremental approach are also discussed.</description><subject>Computer networks</subject><subject>Data mining</subject><subject>Network security</subject><subject>Neural networks</subject><issn>2076-0930</issn><issn>2073-607X</issn><issn>2073-607X</issn><issn>2076-0930</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2011</creationdate><recordtype>article</recordtype><recordid>eNotkM1LAzEQxYMoWKt3j8H71snHbpKLUKrVQtGDCt5CdjvBrW1Sk22l_71r62mGeY_3hh8h1wxGTKmK37bLJrR5tBOtGDGQJ2TAQYmiAvVxetirAoyAc3KR8xKgqgDMgNy9btMO9zQGOgtNwjWGzq3oeLNJ0TWfmKmPiT5j9xPTFx2HuHarPb3HDpuujeGSnHm3ynj1P4fkffrwNnkq5i-Ps8l4XjRM6K7gxtRKcdDIa21qB9rJ0te1KcWiVxxgryBIxrh3XmrNSoBywZRmUtfGiyG5Oeb2b31vMXd2Gbcp9JXWcA5VKaTsTXA0NSnmnNDbTWrXLu0tA3uAZI-Q7B-k_ijFL0NsW-I</recordid><startdate>20111219</startdate><enddate>20111219</enddate><creator>J K Kalita, M. Hussain Bhuyan, D K Bhattacharyya</creator><general>Kohat University of Science and Technology (KUST)</general><scope>AAYXX</scope><scope>CITATION</scope><scope>3V.</scope><scope>4T-</scope><scope>4U-</scope><scope>7RQ</scope><scope>7XB</scope><scope>88F</scope><scope>88I</scope><scope>88K</scope><scope>8AL</scope><scope>8FE</scope><scope>8FG</scope><scope>8FK</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>GNUQQ</scope><scope>HCIFZ</scope><scope>JQ2</scope><scope>K7-</scope><scope>M0N</scope><scope>M1Q</scope><scope>M2P</scope><scope>M2T</scope><scope>P5Z</scope><scope>P62</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PRINS</scope><scope>Q9U</scope><scope>U9A</scope></search><sort><creationdate>20111219</creationdate><title>Survey on Incremental Approaches for Network Anomaly Detection</title><author>J K Kalita, M. Hussain Bhuyan, D K Bhattacharyya</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c138t-299b77208e2b89ba08a45fbb953d9b7a0e8e2e04112faf48815005d178148b9f3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2011</creationdate><topic>Computer networks</topic><topic>Data mining</topic><topic>Network security</topic><topic>Neural networks</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>J K Kalita, M. Hussain Bhuyan, D K Bhattacharyya</creatorcontrib><collection>CrossRef</collection><collection>ProQuest Central (Corporate)</collection><collection>Docstoc</collection><collection>University Readers</collection><collection>Career &amp; Technical Education Database</collection><collection>ProQuest Central (purchase pre-March 2016)</collection><collection>Military Database (Alumni Edition)</collection><collection>Science Database (Alumni Edition)</collection><collection>Telecommunications (Alumni Edition)</collection><collection>Computing Database (Alumni Edition)</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>ProQuest Central (Alumni) (purchase pre-March 2016)</collection><collection>ProQuest Central (Alumni)</collection><collection>ProQuest Central</collection><collection>Advanced Technologies &amp; Aerospace Collection</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central</collection><collection>ProQuest Central Student</collection><collection>SciTech Premium Collection</collection><collection>ProQuest Computer Science Collection</collection><collection>Computer Science Database</collection><collection>Computing Database</collection><collection>Military Database</collection><collection>Science Database</collection><collection>Telecommunications Database</collection><collection>Advanced Technologies &amp; Aerospace Database</collection><collection>ProQuest Advanced Technologies &amp; Aerospace Collection</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central China</collection><collection>ProQuest Central Basic</collection><jtitle>International journal of communication networks and information security</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>J K Kalita, M. Hussain Bhuyan, D K Bhattacharyya</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Survey on Incremental Approaches for Network Anomaly Detection</atitle><jtitle>International journal of communication networks and information security</jtitle><date>2011-12-19</date><risdate>2011</risdate><volume>3</volume><issue>3</issue><spage>226</spage><pages>226-</pages><issn>2076-0930</issn><issn>2073-607X</issn><eissn>2073-607X</eissn><eissn>2076-0930</eissn><abstract> As the communication industry has connected distant corners of the globe using advances in network technology, intruders or attackers have also increased attacks on networking infrastructure commensurately. System administrators can attempt to prevent such attacks using intrusion detection tools and systems. There are many commercially available signature-based Intrusion Detection Systems (IDSs). However, most IDSs lack the capability to detect novel or previously unknown attacks. A special type of IDSs, called Anomaly Detection Systems, develop models based on normal system or network behavior, with the goal of detecting both known and unknown attacks. Anomaly detection systems face many problems including high rate of false alarm, ability to work in online mode, and scalability. This paper presents a selective survey of incremental approaches for detecting anomaly in normal system or network traffic. The technological trends, open problems, and challenges over anomaly detection using incremental approach are also discussed.</abstract><cop>Kohat</cop><pub>Kohat University of Science and Technology (KUST)</pub><doi>10.17762/ijcnis.v3i3.104</doi></addata></record>
fulltext fulltext
identifier ISSN: 2076-0930
ispartof International journal of communication networks and information security, 2011-12, Vol.3 (3), p.226
issn 2076-0930
2073-607X
2073-607X
2076-0930
language eng
recordid cdi_proquest_journals_922065344
source Freely Accessible Journals
subjects Computer networks
Data mining
Network security
Neural networks
title Survey on Incremental Approaches for Network Anomaly Detection
url http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-09T09%3A10%3A44IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Survey%20on%20Incremental%20Approaches%20for%20Network%20Anomaly%20Detection&rft.jtitle=International%20journal%20of%20communication%20networks%20and%20information%20security&rft.au=J%20K%20Kalita,%20M.%20Hussain%20Bhuyan,%20D%20K%20Bhattacharyya&rft.date=2011-12-19&rft.volume=3&rft.issue=3&rft.spage=226&rft.pages=226-&rft.issn=2076-0930&rft.eissn=2073-607X&rft_id=info:doi/10.17762/ijcnis.v3i3.104&rft_dat=%3Cproquest_cross%3E2589357981%3C/proquest_cross%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-c138t-299b77208e2b89ba08a45fbb953d9b7a0e8e2e04112faf48815005d178148b9f3%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_pqid=922065344&rft_id=info:pmid/&rfr_iscdi=true