Part 1: Anomaly DetectionInternational audienceEntropy has been widely used for anomaly detection in various disciplines. One such is in network attack detection, where its role is to detect significant changes in underlying distribution shape due to anomalous behaviour such as attacks. In this paper, we point out that entropy has significant blind spots, which can be made use by adversaries to evade detection. To illustrate the potential pitfalls, we give an in-principle analysis of network attack detection, in which we design a camouflage technique and show analytically that it can perfectly mask attacks from entropy based detector with low costs in terms of the volume of traffic brought in for camouflage. Finally, we illustrate and apply...
The detection of covert channels has quickly become a vital need due to their pervasive nature and t...
Distributed Denial-of-Service (DDoS) attacks are a serious threat to the safety and security of cybe...
The number and impact of attack over the Internet have been continuously increasing in the last year...
Network anomaly detection is a broad area of research. The use of entropy and distributions of traff...
In today\u27s highly networked world, computer intrusions and other attacks area constant threat. Th...
Today, the Internet allows virtually anytime, anywhere access to a seemingly unlimited supply of inf...
Part 7: NetworkingInternational audienceEntropy-based anomaly detection has recently been extensivel...
This paper evaluates the effectiveness of information-theoretic anomaly detection algorithms applied...
Data mining is an interdisciplinary subfield of computer science involving methods at the intersecti...
Anomaly-based Intrusion Detection is a key research topic in network security due to its ability to ...
Thanks to its ability to face unknown attacks, anomaly-based intrusion detection is a key research t...
Anomaly-based Intrusion Detection is a key research topic in network security due to its ability to ...
We develop a behavior-based anomaly detection method that detects network anomalies by comparing the...
Monitoring the empirical Shannon entropy of a feature in a network packet stream has previously been...
Detecting anomalous traffic with low false alarm rates is of primary interest in IP networks managem...
The detection of covert channels has quickly become a vital need due to their pervasive nature and t...
Distributed Denial-of-Service (DDoS) attacks are a serious threat to the safety and security of cybe...
The number and impact of attack over the Internet have been continuously increasing in the last year...
Network anomaly detection is a broad area of research. The use of entropy and distributions of traff...
In today\u27s highly networked world, computer intrusions and other attacks area constant threat. Th...
Today, the Internet allows virtually anytime, anywhere access to a seemingly unlimited supply of inf...
Part 7: NetworkingInternational audienceEntropy-based anomaly detection has recently been extensivel...
This paper evaluates the effectiveness of information-theoretic anomaly detection algorithms applied...
Data mining is an interdisciplinary subfield of computer science involving methods at the intersecti...
Anomaly-based Intrusion Detection is a key research topic in network security due to its ability to ...
Thanks to its ability to face unknown attacks, anomaly-based intrusion detection is a key research t...
Anomaly-based Intrusion Detection is a key research topic in network security due to its ability to ...
We develop a behavior-based anomaly detection method that detects network anomalies by comparing the...
Monitoring the empirical Shannon entropy of a feature in a network packet stream has previously been...
Detecting anomalous traffic with low false alarm rates is of primary interest in IP networks managem...
The detection of covert channels has quickly become a vital need due to their pervasive nature and t...
Distributed Denial-of-Service (DDoS) attacks are a serious threat to the safety and security of cybe...
The number and impact of attack over the Internet have been continuously increasing in the last year...