Network Statistics in Function of Statistical Intrusion Detection

被引:0
|
作者
Cisar, Petar [1 ]
Cisar, Sanja Maravic [2 ]
机构
[1] Telekom Srbija, Subotica, Serbia
[2] Subot Tech, Subotica, Serbia
关键词
network traffic curves; modelling; descriptive statistics; control limits; adaptive algorithm; intrusion detection;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Intrusion detection is used to monitor and capture intrusions (attacks) into computer network systems which attempt to compromise their security. A lot of different approaches exist for statistical intrusion detection. One of them is behavioral analysis, thus in accordance with this, a model-based algorithm is presented. The paper also elaborates the way of determining the control limits of regular traffic using descriptive statistics. In addition, the paper deals with the statistical formulation or relation between the average and maximum value of network traffic and discuss the time factor in intrusion detection.
引用
收藏
页码:27 / +
页数:2
相关论文
共 50 条
  • [41] Taxonomy of statistical based anomaly detection techniques for intrusion detection
    Qayyum, A
    Islam, MH
    Jamil, M
    IEEE: 2005 International Conference on Emerging Technologies, Proceedings, 2005, : 270 - 276
  • [42] Network intrusion detection method based on VAE-CWGAN and fusion of statistical importance of feature
    Liu, Taotao
    Fu, Yu
    Wang, Kun
    Duan, Xueyuan
    Tongxin Xuebao/Journal on Communications, 2024, 45 (02): : 54 - 67
  • [43] Combining Cisco NetFlow exports with relational database technology for usage statistics, intrusion detection, and network forensics
    Navarro, JP
    Nickless, B
    Winkler, L
    USENIX ASSOCIATION PROCEEDINGS OF THE FOURTEENTH SYSTEMS ADMINISTRATION CONFERENCE (LISA XIV), 2000, : 285 - 290
  • [44] Visualizing network data for intrusion detection
    Abdullah, K
    Lee, A
    Conti, G
    Copeland, JA
    PROCEEDINGS FROM THE SIXTH ANNUAL IEEE SYSTEMS, MAN AND CYBERNETICS INFORMATION ASSURANCE WORKSHOP, 2005, : 100 - 108
  • [45] Data analytics for network intrusion detection
    Wang, Lidong
    Jones, Randy
    Journal of Cyber Security Technology, 2020, 4 (02) : 106 - 123
  • [46] Markov chains in network intrusion detection
    Hixon, R
    Gruenbacher, DA
    PROCEEDINGS FROM THE FIFTH IEEE SYSTEMS, MAN AND CYBERNETICS INFORMATION ASSURANCE WORKSHOP, 2004, : 432 - 433
  • [47] Integrating intrusion detection and network management
    Qin, XH
    Lee, W
    Lewis, L
    Cabrera, JBD
    NOMS 2002: IEEE/IFIP NETWORK OPERATIONS AND MANAGEMENT SYMPOSIUM: MANAGEMENT SOLUTIONS FOR THE NEW COMMUNICATIONS WORLD, 2002, : 329 - 344
  • [48] Deep Stacking Network for Intrusion Detection
    Tang, Yifan
    Gu, Lize
    Wang, Leiting
    SENSORS, 2022, 22 (01)
  • [49] Research on Network Intrusion Detection System
    Xu, Jiang
    Cao, Zhongwei
    MICRO NANO DEVICES, STRUCTURE AND COMPUTING SYSTEMS, 2011, 159 : 77 - +
  • [50] Neural network ensembles for intrusion detection
    Golovko, Vladimir
    Kachurka, Pavel
    Vaitsekhovich, Leanid
    IDAACS 2007: PROCEEDINGS OF THE 4TH IEEE WORKSHOP ON INTELLIGENT DATA ACQUISITION AND ADVANCED COMPUTING SYSTEMS: TECHNOLOGY AND APPLICATIONS, 2007, : 578 - 583