Abstract
With advances in network technologies, the variety and volume, Internet services that are provided by commercial, nonprofit or governmental organizations undergo constant growth, causing commensurate and often exposure expansion in network traffic.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Aydin, M.A., Zaim, A.H., Ceylan, K.G.: A hybrid intrusion detection system design for computer network security. Comput. Electr. Eng. 35(3), 517–526 (2009)
Bace, R., Mell, P.: Intrusion detection systems. Tech. Rep. SP800-31, NIST Special Publications, US Department of Defence, USA (2001)
Burbeck, K., Nadjm-Tehrani, S.: Adaptive real-time anomaly detection with incremental clustering. Information Security Technical Report 12(1), 56–67 (2007)
Casas, P., Mazel, J., Owezarski, P.: Unsupervised network intrusion detection systems: detecting the unknown without knowledge. Comput. Commun. 35(7), 772–783 (2012)
Chandola, V., Banerjee, A., Kumar, V.: Anomaly detection: a survey. ACM Comput. Surv. 41(3), 1–58 (2009)
David, S.T.: Network intrusion prevention systems: signature-based and anomaly detection. Ph.D. thesis, The Hebrew University of Jerusalem, April (2011)
Erman, J., Mahanti, A., Arlitt, M., Cohen, I., Williamson, C.: Semi-supervised network traffic classification. SIGMETRICS Perform. Eval. Rev. 35(1), 369–370 (2007)
Fayyad, U., Piatetsky-Shapiro, G., Smyth, P.: The KDD process for extracting useful knowledge from volumes of data. Commun. ACM 39(11), 27–34 (1996). doi:10.1145/240455.240464
Jiang, S., Song, X., Wang, H., Han, J.J., Li, Q.H.: A clustering-based method for unsupervised intrusion detections. Pattern Recogn. Lett. 27(7), 802–810 (2006)
Khreich, W., Granger, E., Miri, A., Sabourin, R.: Adaptive ROC-based ensembles of HMMs applied to anomaly detection. Pattern Recogn. 45(1), 208–230 (2012)
Kumar, V.: Parallel and distributed computing for cybersecurity. IEEE Distrib. Syst. Online 6(10) (2005)
Laskov, P., Gehl, C., Krüger, S., Müller, K.R.: Incremental support vector learning: analysis, implementation and applications. J. Mach. Learn. Res. 7, 1909–1936 (2006)
Noto, K., Brodley, C., Slonim, D.: FRaC: a feature-modeling approach for semi-supervised and unsupervised anomaly detection. Data Min. Knowl. Discov. 25(1), 109–133 (2012). doi:10.1007/s10618-011-0234-x
Panda, M., Abraham, A., Patra, M.R.: Hybrid intelligent systems for detecting network intrusions. Secur. Commun. Netw. 8(16), 2741–2749 (2015). http://dx.doi.org/10.1002/sec.592
Patcha, A., Park, J.M.: An overview of anomaly detection techniques: existing solutions and latest technological trends. Comput. Netw. 51(12), 3448–3470 (2007)
Shimonski, R.: The Wireshark field guide: analyzing and troubleshooting network traffic. Syngress Media, U.S. (2013)
Song, J., Takakura, H., Okabe, Y., Nakao, K.: Toward a more practical unsupervised anomaly detection system. Inf. Sci. 231 (2011). http://dx.doi.org/10.1016/j.ins.2011.08.011
Su, M.Y.: Using clustering to improve the KNN-based classifiers for online anomaly network traffic identification. J. Netw. Comput. Appl. 34(2), 722–730 (2011)
Tan, P.N., Steinbach, M., Kumar, V.: Introduction to Data Mining, 4th edn. Addison-Wesley, Pearson Education, India (2009)
Tanenbaum, A.: Computer Networks. Prentice Hall Professional Technical Reference, 4th edn. Prentice Hall, Pearson Education, India (2002)
Thottan, M., Ji, C.: Anomaly detection in IP networks. IEEE Trans. Signal Process. 51(8), 2191–2204 (2003)
Toosi, A.N., Kahani, M.: A new approach to intrusion detection based on an evolutionary soft computing model using Neuro-fuzzy classifiers. Comput. Commun. 30(10), 2201–2212 (2007)
Wood, P., Egan, G., Haley, K., Tran, T., Cox, O.: Internet security threat report. Tech. Rep. 17, Symantec, USA (2012)
Wu, S.X., Banzhaf, W.: The use of computational intelligence in intrusion detection systems: a review. Appl. Soft Comput. 10(1), 1–35 (2010)
Yi, Y., Wu, J., Xu, W.: Incremental SVM based on reserved set for network intrusion detection. Expert Syst. Appl. 38(6), 7698–7707 (2011)
Zhang, J., Chen, C., Xiang, Y., Zhou, W.: Semi-supervised and compound classification of network traffic. In: Proceedings of the 32nd International Conference on Distributed Computing Systems Workshops, pp. 617–621 (2012). doi:10.1109/ICDCSW.2012.12
Zhang, J., Zulkernine, M.: A hybrid network intrusion detection technique using random forests. In: Proceedings of the 1st International Conference on Availability, Reliability and Security, pp. 262–269. IEEE, CS, USA (2006). doi:10.1109/ARES.2006.7
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer International Publishing AG
About this chapter
Cite this chapter
Bhuyan, M.H., Bhattacharyya, D.K., Kalita, J.K. (2017). Introduction. In: Network Traffic Anomaly Detection and Prevention. Computer Communications and Networks. Springer, Cham. https://doi.org/10.1007/978-3-319-65188-0_1
Download citation
DOI: https://doi.org/10.1007/978-3-319-65188-0_1
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-65186-6
Online ISBN: 978-3-319-65188-0
eBook Packages: Computer ScienceComputer Science (R0)