Network Statistics in Function of Statistical Intrusion Detection

被引:0
|
作者
Cisar, Petar [1 ]
Cisar, Sanja Maravic [2 ]
机构
[1] Telekom Srbija, Subotica, Serbia
[2] Subot Tech, Subotica, Serbia
关键词
network traffic curves; modelling; descriptive statistics; control limits; adaptive algorithm; intrusion detection;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Intrusion detection is used to monitor and capture intrusions (attacks) into computer network systems which attempt to compromise their security. A lot of different approaches exist for statistical intrusion detection. One of them is behavioral analysis, thus in accordance with this, a model-based algorithm is presented. The paper also elaborates the way of determining the control limits of regular traffic using descriptive statistics. In addition, the paper deals with the statistical formulation or relation between the average and maximum value of network traffic and discuss the time factor in intrusion detection.
引用
收藏
页码:27 / +
页数:2
相关论文
共 50 条
  • [21] Intelligent Intrusion Detection Using Radial Basis Function Neural Network
    AbuGhazleh, Alia
    Almiani, Muder
    Magableh, Basel
    Razaque, Abdul
    2019 SIXTH INTERNATIONAL CONFERENCE ON SOFTWARE DEFINED SYSTEMS (SDS), 2019, : 200 - 208
  • [22] A Membership Function for Feature Clustering Based Network Intrusion and Anomaly Detection
    Nagaraja, Arun
    Kumar, T. Satish
    ICEMIS'18: PROCEEDINGS OF THE FOURTH INTERNATIONAL CONFERENCE ON ENGINEERING AND MIS, 2018,
  • [23] EWMA STATISTICS AND FUZZY LOGIC IN FUNCTION OF NETWORK ANOMALY DETECTION
    Cisar, Petar
    Cisar, Sanja Maravic
    FACTA UNIVERSITATIS-SERIES ELECTRONICS AND ENERGETICS, 2019, 32 (02) : 249 - 265
  • [24] Statistical Evaluation of Network Packets in an Intrusion Detection Mechanism Using ML and DL Techniques
    Raju, K. Srujan
    Singh, Manmohan
    Subburaj, T.
    Mahajan, Rashima
    Victoria, D. Rosy Salomi
    Ramkumar, R.
    Fahamitha, J.
    CYBERNETICS AND SYSTEMS, 2023,
  • [25] Fast Detection of Network Intrusion
    Chen, Xinjia
    Walker, Ernest
    DEFENSE TRANSFORMATION AND NET-CENTRIC SYSTEMS 2011, 2011, 8062
  • [26] Hybrid Network Intrusion Detection
    Tahmoush, David
    SENSORS, AND COMMAND, CONTROL, COMMUNICATIONS, AND INTELLIGENCE (C3I) TECHNOLOGIES FOR HOMELAND SECURITY AND HOMELAND DEFENSE XIII, 2014, 9074
  • [27] An efficient network intrusion detection
    Chen, Chia-Mei
    Chen, Ya-Lin
    Lin, Hsiao-Chung
    COMPUTER COMMUNICATIONS, 2010, 33 (04) : 477 - 484
  • [28] Counselors network for intrusion detection
    Quincozes, Silvio E.
    Raniery, Carlos
    Nunes, Raul Ceretta
    Albuquerque, Celio
    Passos, Diego
    Mosse, Daniel
    INTERNATIONAL JOURNAL OF NETWORK MANAGEMENT, 2021, 31 (03)
  • [29] The sound of intrusion: A novel network intrusion detection system
    Aldarwbi, Mohammed Y.
    Lashkari, Arash H.
    Ghorbani, Ali A.
    COMPUTERS & ELECTRICAL ENGINEERING, 2022, 104
  • [30] Recurrent network in Network Intrusion Detection System
    Xue, JS
    Sun, JZ
    Zhang, X
    PROCEEDINGS OF THE 2004 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-7, 2004, : 2676 - 2679