Research in the detection of cyber-attacks has sky-rocketed in the recent past. However, there remains a striking gap between usage of the proposed algorithms in academic research versus industrial applications. Leading researchers have argued that efforts toward the understanding of proposed detectors are lacking. By digging deeper into their inner workings and critically evaluating their underlying assumptions, better detectors may be built. The aim of this thesis is therefore to provide an underlying theory for understanding a single class of detection algorithms, in particular, anomaly-based network intrusion detection algorithms that utilise high-resolution time series data. A framework is proposed to deconstruct the algorithms into th...
During a denial of service attack, it is difficult for a firewall to differentiate legitimate packet...
Threats to network security increase with growing volumes and velocity of data across networks, and ...
The Internet of Things (IoT), in combination with advancements in Big Data, communications and netwo...
As our reliance on computer networks grows, the need for better and more accurate intrusion detectio...
YesWith the rapid growth of security threats in computer networks, the need for developing efficient...
International audienceWith the Internet's unprecedented growth and nations' reliance on computer net...
Despite the Internet being an apex of human achievement for many years, criminal behaviour and malic...
In recent years, with the increased use of network communication, the risk of compromising the infor...
Statistical anomaly detection (SAD) is an important component of securing modern networks facing con...
International audienceThe goals of the present contribution are twofold. First, we propose the use o...
In this paper, we present the design and implementation of a new approach for anomaly detection and ...
As the number of cyber-attacks continues to grow on a daily basis, so does the delay in threat detec...
[Abstract] Communication network data has been growing in the last decades and with the generalisati...
peer reviewedModern network intrusion detection systems rely on machine learning techniques to detec...
Anomaly detection in computer networks yields valuable information on events relating to the compone...
During a denial of service attack, it is difficult for a firewall to differentiate legitimate packet...
Threats to network security increase with growing volumes and velocity of data across networks, and ...
The Internet of Things (IoT), in combination with advancements in Big Data, communications and netwo...
As our reliance on computer networks grows, the need for better and more accurate intrusion detectio...
YesWith the rapid growth of security threats in computer networks, the need for developing efficient...
International audienceWith the Internet's unprecedented growth and nations' reliance on computer net...
Despite the Internet being an apex of human achievement for many years, criminal behaviour and malic...
In recent years, with the increased use of network communication, the risk of compromising the infor...
Statistical anomaly detection (SAD) is an important component of securing modern networks facing con...
International audienceThe goals of the present contribution are twofold. First, we propose the use o...
In this paper, we present the design and implementation of a new approach for anomaly detection and ...
As the number of cyber-attacks continues to grow on a daily basis, so does the delay in threat detec...
[Abstract] Communication network data has been growing in the last decades and with the generalisati...
peer reviewedModern network intrusion detection systems rely on machine learning techniques to detec...
Anomaly detection in computer networks yields valuable information on events relating to the compone...
During a denial of service attack, it is difficult for a firewall to differentiate legitimate packet...
Threats to network security increase with growing volumes and velocity of data across networks, and ...
The Internet of Things (IoT), in combination with advancements in Big Data, communications and netwo...