Network Access Control (NAC) systems manage the access of new devices into enterprise networks to prevent unauthorised devices from attacking network services. The main difficulty with this approach is that NAC cannot detect abnormal behaviour of devices connected to an enterprise network. These abnormal devices can be detected using outlier detection techniques. Existing outlier detection techniques focus on specific application domains such as fraud, event or system health monitoring. In this paper, we review attacks on Bring Your Own Device (BYOD) enterprise networks as well as existing clustering-based outlier detection algorithms along with their limitations. Importantly, existing techniques can detect outliers, but cannot detect where...
AbstractAn Intrusion Detection System (IDS) is a software application or device that monitors the sy...
Data-driven anomaly detection systems unrivalled potential as complementary defence systems to exist...
Abnormal network traffic analysis through Intrusion Detection Systems (IDSs) and visualization techn...
Current network access control systems can contain unpredictable interactions between multiple devic...
The detection of outliers has gained considerable interest in data mining with the realization that ...
Network Access Control (NAC) systems are technologies and defined policies typically established to ...
Intrusion detection is crucial in computer network security issues; therefore, this work is aimed at...
Outlier detection is a subfield of data mining to determine data points that notably deviate from th...
With the advent of the Internet, security has become a major concern. An intrusion detection system ...
Abstract—With the increasing dependence on wireless LANs (WLANs), businesses, educational institutio...
International audienceEnergy providers are massively deploying devices to manage distributed resourc...
Intrusion detection systems (IDS) play a critical role in network security by monitoring systems and...
Διπλωματική εργασία--Πανεπιστήμιο Μακεδονίας, Θεσσαλονίκη, 2014.In this paper we outline the basic p...
Data analysis to identifying attacks/anomalies is a crucial task in anomaly detection and network an...
open access journalThe emergence of the Internet of Things (IoT) has lead to a tech- nological trans...
AbstractAn Intrusion Detection System (IDS) is a software application or device that monitors the sy...
Data-driven anomaly detection systems unrivalled potential as complementary defence systems to exist...
Abnormal network traffic analysis through Intrusion Detection Systems (IDSs) and visualization techn...
Current network access control systems can contain unpredictable interactions between multiple devic...
The detection of outliers has gained considerable interest in data mining with the realization that ...
Network Access Control (NAC) systems are technologies and defined policies typically established to ...
Intrusion detection is crucial in computer network security issues; therefore, this work is aimed at...
Outlier detection is a subfield of data mining to determine data points that notably deviate from th...
With the advent of the Internet, security has become a major concern. An intrusion detection system ...
Abstract—With the increasing dependence on wireless LANs (WLANs), businesses, educational institutio...
International audienceEnergy providers are massively deploying devices to manage distributed resourc...
Intrusion detection systems (IDS) play a critical role in network security by monitoring systems and...
Διπλωματική εργασία--Πανεπιστήμιο Μακεδονίας, Θεσσαλονίκη, 2014.In this paper we outline the basic p...
Data analysis to identifying attacks/anomalies is a crucial task in anomaly detection and network an...
open access journalThe emergence of the Internet of Things (IoT) has lead to a tech- nological trans...
AbstractAn Intrusion Detection System (IDS) is a software application or device that monitors the sy...
Data-driven anomaly detection systems unrivalled potential as complementary defence systems to exist...
Abnormal network traffic analysis through Intrusion Detection Systems (IDSs) and visualization techn...