Nowadays, organization networks are facing an increased number of different attacks and existing intrusion and anomaly detection systems fail to keep up. By focusing on security policies, malicious signatures or generic network characteristics, existing systems are not able to cover the full landscape of attacks. In this thesis we try to tackle the problem of anomaly detection on a user network behavior level and an application level. In the proposed framework, network traffic is first separated into different flows based on the mobile application it originates from. Moving forward, the processed network flows are used as input for a flexible noise tolerant behavior modeling framework. The proposed framework is based on density based cluste...
The analysis of the network traffic in 5G networks is of high significance to the network security a...
Anomaly detection is based on profiles that represent normal behavior of users, hosts or networks an...
Abstract Much of the intrusion detection research focuses on signature (misuse) detection, where mod...
Abstract With the popularization of smartphones, they have become the main target of malicious appli...
Information systems and their services (referred to as cyberspace) are ubiquitous and touch all aspe...
Huge amounts of operation data are constantly collected from the performance monitoring and system l...
Functioning mobile telecommunication networks are taken for granted in present-day society. The netw...
Current network access control systems can contain unpredictable interactions between multiple devic...
As information systems become increasingly complex and pervasive, they become inextricably intertwin...
Techniques are described herein for clustering network hosts based on their network behavior to crea...
Anomaly Detection (AD) sensors compute behavior pro-files to recognize malicious or anomalous activi...
Anomaly detection of network traffic flows is a non-trivial problem in the field of network security...
Observing network traffic flow for anomalies is a common method in Intrusion Detection. More effort ...
This dissertation presents anomaly based approaches in network intrusion detection that suffer from ...
Recent studies have shown that a number of network attacks that were used to target mainframes and p...
The analysis of the network traffic in 5G networks is of high significance to the network security a...
Anomaly detection is based on profiles that represent normal behavior of users, hosts or networks an...
Abstract Much of the intrusion detection research focuses on signature (misuse) detection, where mod...
Abstract With the popularization of smartphones, they have become the main target of malicious appli...
Information systems and their services (referred to as cyberspace) are ubiquitous and touch all aspe...
Huge amounts of operation data are constantly collected from the performance monitoring and system l...
Functioning mobile telecommunication networks are taken for granted in present-day society. The netw...
Current network access control systems can contain unpredictable interactions between multiple devic...
As information systems become increasingly complex and pervasive, they become inextricably intertwin...
Techniques are described herein for clustering network hosts based on their network behavior to crea...
Anomaly Detection (AD) sensors compute behavior pro-files to recognize malicious or anomalous activi...
Anomaly detection of network traffic flows is a non-trivial problem in the field of network security...
Observing network traffic flow for anomalies is a common method in Intrusion Detection. More effort ...
This dissertation presents anomaly based approaches in network intrusion detection that suffer from ...
Recent studies have shown that a number of network attacks that were used to target mainframes and p...
The analysis of the network traffic in 5G networks is of high significance to the network security a...
Anomaly detection is based on profiles that represent normal behavior of users, hosts or networks an...
Abstract Much of the intrusion detection research focuses on signature (misuse) detection, where mod...