Abstract
In the system and networks, abnormal behavior is detected by anomaly-based IDS (Intrusion Detection System). If the working of a computer system is different from normal working is considered as an attack. The difference of comparison relies on traffic rate, a variety of packets for every protocol etc. Malicious traffic or data on a system is detected by intrusion detection process. To detect illegal, suspicious and malicious information and data, IDS can be a part of the software or a device. First is Detection of an attack then using different method to stop, Prevent an attack and disaster is the user’s highest priority. Anomaly-based IDS satisfy their requirement and demand.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Patcha, A., Park, J.-M.: An overview of anomaly detection techniques: existing solutions and latest technological trends. Comput. Netw. 51, 3448–3470 (2007)
Han, S.-J., Cho, S.-B.: Evolutionary neural networks for anomaly detection based on the behavior of a program. IEEE Trans. Syst. Man Cybern.—Part B Cybern. 36(3), 559–570 (2006)
Thottan, M., Ji, C.: Anomaly detection in IP networks. IEEE Trans. Sig. Process. 51(8), 2191–2204 (2003)
Chebrolu, S., Abraham, A., Thomas, J.P.: Feature deduction and ensemble design of intrusion detection systems. Comput. Secur. (2004)
Bhuyan, M.H., Bhattacharyya, D.K., Kalita, J.K.: Network anomaly detection: methods, systems and tools. IEEE Commun. Surv. Tutorials 16, 303–336 (2014)
Teodoro, P.G., Verdejo, J.D., Fernández, G.M., Vázquez, E.: Anomaly-based network intrusion detection: techniques, systems and challenges. Comput. Secur. 28, 18–28 (2009)
Tavallaee, M., Bagheri, E., Lu, W., Ghorbani, A.A.: A detailed analysis of the KDD CUP 99 data set. In: Chandola, V., Banerjee, A., Kumar, V. (eds.) 2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications (2009). Anomaly detection for discrete sequences: a survey. IEEE Transactions on Knowledge and Data Engineering
Tsai, C.-F., Hsu, Y.-F.: Intrusion detection by machine learning: a review. Expert Syst. Appl. 36, 11994–12000 (2009)
Sommer, R., Paxson, V.: Outside the closed world: on using machine learning for network intrusion detection. In: IEEE Symposium on Security and Privacy, May 2010
Agrawal, S., Agrawal, J.: Survey on Anomaly Detection using Data Mining Techniques. Elsevier Publication (2015)
Ahmed, M.A., Mahmood, N., RafiqulIslam, Md: A survey of anomaly detection techniques in financial domain. Future Gener. Comput. Syst. 55, 278–288 (2016)
Kaur, P., Vashisht, S.: Evaluation of intrusion detection techniques and algorithms in terms of performance and efficiency through data mining. In: Evaluation of Intrusion Detection Techniques and Algorithms in Terms of Performance and Efficiency through Data Mining, June 2013
Kaur, H., Singh, G., Minhas, J.: A review of machine learning based anomaly detection techniques. Int. J. Comput. Appl. Technol. Res. 2(2), 185–187 (2013)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Switzerland AG
About this paper
Cite this paper
Umasoni, Kumari, U., Kumar, A. (2019). A Comparative Study of Anomaly Based Detection Techniques. In: Hemanth, J., Fernando, X., Lafata, P., Baig, Z. (eds) International Conference on Intelligent Data Communication Technologies and Internet of Things (ICICI) 2018. ICICI 2018. Lecture Notes on Data Engineering and Communications Technologies, vol 26. Springer, Cham. https://doi.org/10.1007/978-3-030-03146-6_38
Download citation
DOI: https://doi.org/10.1007/978-3-030-03146-6_38
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-03145-9
Online ISBN: 978-3-030-03146-6
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)