AbstractResearch Tools in Anomaly-based Intrusion Detection are highly dependent on appropriate traffic trace data. Traditional datasets present several issues such as: removal of sensitive information (anonymization) and insufficient number or volume of attack instances, which limit their quality for the design and evaluation of A-NIDSs. In this paper, we present a method for anomalous traffic filtering which can be used for generating anomaly-free traffic traces. The sanitized dataset can be used to improve the computation of the behaviour profiles during the training stage. The proposal is based on the construction and statistical analysis of the flow-level entropy space for the identification of outliers using three entropy estimators. ...
Abstract — Currently, flow-level anomaly detection systems get widely deployed in ISP networks to pr...
The spread of 1-10Gbps technology has in recent years paved the way to a flourishing landscape of ne...
Part 1: Anomaly DetectionInternational audienceEntropy has been widely used for anomaly detection in...
The accuracy and reliability of an anomaly-based network intrusion detection system are dependent o...
AbstractIn this paper, a technique for detecting anomalous behavior traffic in a computer network is...
Today, the Internet allows virtually anytime, anywhere access to a seemingly unlimited supply of inf...
Anomaly-based Intrusion Detection is a key research topic in network security due to its ability to ...
Network anomaly detection is a broad area of research. The use of entropy and distributions of traff...
Anomaly-based Intrusion Detection is a key research topic in network security due to its ability to ...
Detecting anomalous traffic with low false alarm rates is of primary interest in IP networks managem...
The increasing practicality of large-scale flow capture makes it possible to conceive of traffic ana...
The increasing practicality of large-scale flow capture makes it possible to conceive of traffic ana...
Thanks to its ability to face unknown attacks, anomaly-based intrusion detection is a key research t...
Diagnosing traffic anomalies rapidly and accurately is critical to the efficient operation of large ...
We develop a behavior-based anomaly detection method that detects network anomalies by comparing the...
Abstract — Currently, flow-level anomaly detection systems get widely deployed in ISP networks to pr...
The spread of 1-10Gbps technology has in recent years paved the way to a flourishing landscape of ne...
Part 1: Anomaly DetectionInternational audienceEntropy has been widely used for anomaly detection in...
The accuracy and reliability of an anomaly-based network intrusion detection system are dependent o...
AbstractIn this paper, a technique for detecting anomalous behavior traffic in a computer network is...
Today, the Internet allows virtually anytime, anywhere access to a seemingly unlimited supply of inf...
Anomaly-based Intrusion Detection is a key research topic in network security due to its ability to ...
Network anomaly detection is a broad area of research. The use of entropy and distributions of traff...
Anomaly-based Intrusion Detection is a key research topic in network security due to its ability to ...
Detecting anomalous traffic with low false alarm rates is of primary interest in IP networks managem...
The increasing practicality of large-scale flow capture makes it possible to conceive of traffic ana...
The increasing practicality of large-scale flow capture makes it possible to conceive of traffic ana...
Thanks to its ability to face unknown attacks, anomaly-based intrusion detection is a key research t...
Diagnosing traffic anomalies rapidly and accurately is critical to the efficient operation of large ...
We develop a behavior-based anomaly detection method that detects network anomalies by comparing the...
Abstract — Currently, flow-level anomaly detection systems get widely deployed in ISP networks to pr...
The spread of 1-10Gbps technology has in recent years paved the way to a flourishing landscape of ne...
Part 1: Anomaly DetectionInternational audienceEntropy has been widely used for anomaly detection in...