Advertisement

A Comparative Study of Anomaly Based Detection Techniques

  • UmasoniEmail author
  • Uma Kumari
  • Anil Kumar
Conference paper
Part of the Lecture Notes on Data Engineering and Communications Technologies book series (LNDECT, volume 26)

Abstract

In the system and networks, abnormal behavior is detected by anomaly-based IDS (Intrusion Detection System). If the working of a computer system is different from normal working is considered as an attack. The difference of comparison relies on traffic rate, a variety of packets for every protocol etc. Malicious traffic or data on a system is detected by intrusion detection process. To detect illegal, suspicious and malicious information and data, IDS can be a part of the software or a device. First is Detection of an attack then using different method to stop, Prevent an attack and disaster is the user’s highest priority. Anomaly-based IDS satisfy their requirement and demand.

Keywords

Anomaly based IDS Malicious traffic  Unwanted attack 

References

  1. 1.
    Patcha, A., Park, J.-M.: An overview of anomaly detection techniques: existing solutions and latest technological trends. Comput. Netw. 51, 3448–3470 (2007)CrossRefGoogle Scholar
  2. 2.
    Han, S.-J., Cho, S.-B.: Evolutionary neural networks for anomaly detection based on the behavior of a program. IEEE Trans. Syst. Man Cybern.—Part B Cybern. 36(3), 559–570 (2006)Google Scholar
  3. 3.
    Thottan, M., Ji, C.: Anomaly detection in IP networks. IEEE Trans. Sig. Process. 51(8), 2191–2204 (2003)CrossRefGoogle Scholar
  4. 4.
    Chebrolu, S., Abraham, A., Thomas, J.P.: Feature deduction and ensemble design of intrusion detection systems. Comput. Secur. (2004)Google Scholar
  5. 5.
    Bhuyan, M.H., Bhattacharyya, D.K., Kalita, J.K.: Network anomaly detection: methods, systems and tools. IEEE Commun. Surv. Tutorials 16, 303–336 (2014)CrossRefGoogle Scholar
  6. 6.
    Teodoro, P.G., Verdejo, J.D., Fernández, G.M., Vázquez, E.: Anomaly-based network intrusion detection: techniques, systems and challenges. Comput. Secur. 28, 18–28 (2009)CrossRefGoogle Scholar
  7. 7.
    Tavallaee, M., Bagheri, E., Lu, W., Ghorbani, A.A.: A detailed analysis of the KDD CUP 99 data set. In: Chandola, V., Banerjee, A., Kumar, V. (eds.) 2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications (2009). Anomaly detection for discrete sequences: a survey. IEEE Transactions on Knowledge and Data EngineeringGoogle Scholar
  8. 8.
    Tsai, C.-F., Hsu, Y.-F.: Intrusion detection by machine learning: a review. Expert Syst. Appl. 36, 11994–12000 (2009)CrossRefGoogle Scholar
  9. 9.
    Sommer, R., Paxson, V.: Outside the closed world: on using machine learning for network intrusion detection. In: IEEE Symposium on Security and Privacy, May 2010Google Scholar
  10. 10.
    Agrawal, S., Agrawal, J.: Survey on Anomaly Detection using Data Mining Techniques. Elsevier Publication (2015)Google Scholar
  11. 11.
    Ahmed, M.A., Mahmood, N., RafiqulIslam, Md: A survey of anomaly detection techniques in financial domain. Future Gener. Comput. Syst. 55, 278–288 (2016)CrossRefGoogle Scholar
  12. 12.
    Kaur, P., Vashisht, S.: Evaluation of intrusion detection techniques and algorithms in terms of performance and efficiency through data mining. In: Evaluation of Intrusion Detection Techniques and Algorithms in Terms of Performance and Efficiency through Data Mining, June 2013Google Scholar
  13. 13.
    Kaur, H., Singh, G., Minhas, J.: A review of machine learning based anomaly detection techniques. Int. J. Comput. Appl. Technol. Res. 2(2), 185–187 (2013)Google Scholar

Copyright information

© Springer Nature Switzerland AG 2019

Authors and Affiliations

  1. 1.Computer Science DepartmentMUSTLakshmangarhIndia

Personalised recommendations