메뉴 건너뛰기




Volumn 60, Issue , 2016, Pages 19-31

A survey of network anomaly detection techniques

Author keywords

Anomaly detection; Classification; Clustering; Computer security; Information theory; Intrusion detection

Indexed keywords

CLASSIFICATION (OF INFORMATION); ECONOMIC AND SOCIAL EFFECTS; ECONOMICS; INFORMATION THEORY; MERCURY (METAL); NATIONAL SECURITY; SECURITY OF DATA; SIGNAL DETECTION;

EID: 84950256593     PISSN: 10848045     EISSN: 10958592     Source Type: Journal    
DOI: 10.1016/j.jnca.2015.11.016     Document Type: Review
Times cited : (1199)

References (100)
  • 1
    • 84950249826 scopus 로고    scopus 로고
    • Adfa intrusion detection datasets, accessed: 2014-12-29
    • Adfa intrusion detection datasets, accessed: 2014-12-29. URL (http://seit.unsw.adfa.edu.au/staff/sites/hu/).
  • 5
    • 84950287149 scopus 로고    scopus 로고
    • Novel approach for network traffic pattern analysis using clustering-based collective anomaly detection
    • M. Ahmed, and A. Mahmood Novel approach for network traffic pattern analysis using clustering-based collective anomaly detection Ann. Data Sci. 2 1 2015 111 130
    • (2015) Ann. Data Sci. , vol.2 , Issue.1 , pp. 111-130
    • Ahmed, M.1    Mahmood, A.2
  • 7
    • 84942617474 scopus 로고    scopus 로고
    • CRC Press, New York, USA Chapter 1 (in book: The State of the Art in Intrusion Prevention and Detection)
    • Ahmed M, Mahmood AN, Hu J. Outlier Detection, CRC Press, New York, USA, 2014. p. 3-21, Chapter 1 (in book: The State of the Art in Intrusion Prevention and Detection).
    • (2014) Outlier Detection , pp. 3-21
    • Ahmed, M.1    Mahmood, A.N.2    Hu, J.3
  • 8
    • 84950263717 scopus 로고    scopus 로고
    • A survey of anomaly detection techniques in financial domain
    • 2016
    • M. Ahmed, A.N. Mahmood, and M.R. Islam A survey of anomaly detection techniques in financial domain Future Gener Comp Syst 55 2016 278 288
    • Future Gener Comp Syst , vol.55 , pp. 278-288
    • Ahmed, M.1    Mahmood, A.N.2    Islam, M.R.3
  • 9
    • 85037526269 scopus 로고    scopus 로고
    • An investigation of performance analysis of anomaly detection techniques for big data in scada systems
    • M. Ahmed, A. Anwar, A.N. Mahmood, Z. Shah, and M.J. Maher An investigation of performance analysis of anomaly detection techniques for big data in scada systems EAI Endorsed Trans Ind Netw Intell Syst 15 3 2015 1 16
    • (2015) EAI Endorsed Trans Ind Netw Intell Syst , vol.15 , Issue.3 , pp. 1-16
    • Ahmed, M.1    Anwar, A.2    Mahmood, A.N.3    Shah, Z.4    Maher, M.J.5
  • 10
    • 84950279408 scopus 로고    scopus 로고
    • An efficient technique for network traffic summarization using multiview clustering and statistical sampling
    • M. Ahmed, A.N. Mahmood, and M.J. Maher An efficient technique for network traffic summarization using multiview clustering and statistical sampling EAI Endorsed Trans Scalable Inf Syst 15 5 2015 1 9
    • (2015) EAI Endorsed Trans Scalable Inf Syst , vol.15 , Issue.5 , pp. 1-9
    • Ahmed, M.1    Mahmood, A.N.2    Maher, M.J.3
  • 16
    • 84950284736 scopus 로고    scopus 로고
    • Method and system for confident anomaly detection in computer network traffic
    • Balabine I, Velednitsky A. Method and system for confident anomaly detection in computer network traffic. Google Patents, 2015.
    • (2015) Google Patents
    • Balabine, I.1    Velednitsky, A.2
  • 17
    • 34548691246 scopus 로고    scopus 로고
    • A generalized maximum entropy approach to bregman co-clustering and matrix approximation
    • A. Banerjee, I. Dhillon, J. Ghosh, S. Merugu, and D.S. Modha A generalized maximum entropy approach to bregman co-clustering and matrix approximation J Mach Learn Res 8 2007 1919 1986
    • (2007) J Mach Learn Res , vol.8 , pp. 1919-1986
    • Banerjee, A.1    Dhillon, I.2    Ghosh, J.3    Merugu, S.4    Modha, D.S.5
  • 19
    • 84950237434 scopus 로고    scopus 로고
    • Caida, accessed: 2014-12-29
    • Caida, accessed: 2014-12-29. URL (www.caida.org).
  • 21
    • 84881604461 scopus 로고    scopus 로고
    • Generation of a new ids test dataset: Time to retire the kdd collection
    • 2013 IEEE
    • Creech G, Hu J. Generation of a new ids test dataset: time to retire the kdd collection, In: Wireless communications and networking conference (WCNC), 2013 IEEE, 2013. p. 4487-92.
    • (2013) Wireless Communications and Networking Conference (WCNC) , pp. 4487-4492
    • Creech, G.1    Hu, J.2
  • 23
    • 0034226287 scopus 로고    scopus 로고
    • A revised taxonomy for intrusion-detection systems
    • H. Debar, M. Dacier, and A. Wespi A revised taxonomy for intrusion-detection systems Ann Des Télécommun 55 7-8 2000 361 378
    • (2000) Ann des Télécommun , vol.55 , Issue.7-8 , pp. 361-378
    • Debar, H.1    Dacier, M.2    Wespi, A.3
  • 24
    • 84950260713 scopus 로고    scopus 로고
    • Defcon, accessed: 2014-12-29
    • Defcon, accessed: 2014-12-29. URL (www.defcon.org).
  • 25
    • 84925729055 scopus 로고    scopus 로고
    • Early detection of network element outages based on customer trouble calls
    • Željko Deljac, M. Randic, and G. Krcelic Early detection of network element outages based on customer trouble calls Decis Support Syst 73 2015 57 73
    • (2015) Decis Support Syst , vol.73 , pp. 57-73
    • Deljac, Ž.1    Randic, M.2    Krcelic, G.3
  • 26
    • 0009900351 scopus 로고    scopus 로고
    • Anomaly detection over noisy data using learned probability distributions
    • ICML '00, San Francisco, CA, USA, Morgan Kaufmann Publishers Inc.
    • Eskin E. Anomaly detection over noisy data using learned probability distributions. In: Proceedings of the seventeenth international conference on machine learning, ICML '00, San Francisco, CA, USA, Morgan Kaufmann Publishers Inc., 2000. p. 255-62.
    • (2000) Proceedings of the Seventeenth International Conference on Machine Learning , pp. 255-262
    • Eskin, E.1
  • 28
    • 85170282443 scopus 로고    scopus 로고
    • A density-based algorithm for discovering clusters in large spatial databases with noise
    • Ester M, Kriegel H-P, Sander J, Xu X. A density-based algorithm for discovering clusters in large spatial databases with noise. In: KDD'96, 1996. p. 226-31.
    • (1996) KDD'96 , pp. 226-231
    • Ester, M.1    Kriegel, H.-P.2    Sander, J.3    Xu, X.4
  • 29
    • 4344659702 scopus 로고    scopus 로고
    • Anomaly detection methods in wired networks: A survey and taxonomy
    • J.M. Estevez-Tapiador, P. Garcia-Teodoro, and J.E. Diaz-Verdejo Anomaly detection methods in wired networks: a survey and taxonomy Comput Commun 27 16 2004 1569 1584
    • (2004) Comput Commun , vol.27 , Issue.16 , pp. 1569-1584
    • Estevez-Tapiador, J.M.1    Garcia-Teodoro, P.2    Diaz-Verdejo, J.E.3
  • 30
    • 33846696048 scopus 로고    scopus 로고
    • A new taxonomy for comparing intrusion detection systems
    • S. Furnell, C. Tucker, S. Furnell, B. Ghita, and P. Brooke A new taxonomy for comparing intrusion detection systems Internet Res 17 1 2007 88 98
    • (2007) Internet Res , vol.17 , Issue.1 , pp. 88-98
    • Furnell, S.1    Tucker, C.2    Furnell, S.3    Ghita, B.4    Brooke, P.5
  • 31
    • 79953811849 scopus 로고    scopus 로고
    • A survey of outlier detection methods in network anomaly identification
    • P. Gogoi, D. Bhattacharyya, B. Borah, and J.K. Kalita A survey of outlier detection methods in network anomaly identification Comput J 54 4 2011 570 588
    • (2011) Comput J , vol.54 , Issue.4 , pp. 570-588
    • Gogoi, P.1    Bhattacharyya, D.2    Borah, B.3    Kalita, J.K.4
  • 32
    • 39149141568 scopus 로고    scopus 로고
    • Block clustering with Bernoulli mixture models: Comparison of different approaches
    • G. Govaert, and M. Nadif Block clustering with Bernoulli mixture models: comparison of different approaches Comput Stat Data Anal 52 6 2008 3233 3245
    • (2008) Comput Stat Data Anal , vol.52 , Issue.6 , pp. 3233-3245
    • Govaert, G.1    Nadif, M.2
  • 34
    • 84950281890 scopus 로고    scopus 로고
    • Hacking and cracking tools, accessed: 2014-12-29
    • Hacking and cracking tools, accessed: 2014-12-29. URL (http://hackingncrackingtools.blogspot.com.au/).
  • 38
    • 7544223741 scopus 로고    scopus 로고
    • A survey of outlier detection methodologies
    • V. Hodge, and J. Austin A survey of outlier detection methodologies Artif Intell Rev 22 2 2004 85 126
    • (2004) Artif Intell Rev , vol.22 , Issue.2 , pp. 85-126
    • Hodge, V.1    Austin, J.2
  • 39
    • 84890428705 scopus 로고    scopus 로고
    • Data summarization for network traffic monitoring
    • D. Hoplaros, Z. Tari, and I. Khalil Data summarization for network traffic monitoring J Netw Comput Appl 37 0 2014 194 205
    • (2014) J Netw Comput Appl , vol.37 , pp. 194-205
    • Hoplaros, D.1    Tari, Z.2    Khalil, I.3
  • 41
    • 84950238153 scopus 로고    scopus 로고
    • ICS Attack Dataset, 2014, accessed: 2015-02-27
    • ICS Attack Dataset, 2014, accessed: 2015-02-27. URL (http://www.ece.msstate.edu/wiki/).
  • 42
    • 84950300046 scopus 로고    scopus 로고
    • Identifying outliers via clustering for anomaly detection, accessed: 2014-12-29
    • Identifying outliers via clustering for anomaly detection, accessed: 2014-12-29. URL (https://repository.lib.fit.edu/handle/11141/126).
  • 43
    • 84950254782 scopus 로고    scopus 로고
    • Internet traffic archive, accessed: 2014-12-29
    • Internet traffic archive, accessed: 2014-12-29. URL (http://ita.ee.lbl.gov/).
  • 48
    • 84950255521 scopus 로고    scopus 로고
    • Kyoto Dataset, accessed: 2014-12-29
    • Kyoto Dataset, accessed: 2014-12-29. URL (www.takakura.com).
  • 51
    • 84868695480 scopus 로고    scopus 로고
    • Unsupervised anomaly detection in network intrusion detection using clusters
    • ACSC '05, Australian Computer Society, Inc., Darlinghurst, Australia, Australia
    • Leung K, Leckie C. Unsupervised anomaly detection in network intrusion detection using clusters. In: Proceedings of the twenty-eighth Australasian conference on computer science - vol. 38, ACSC '05, Australian Computer Society, Inc., Darlinghurst, Australia, Australia; 2005. p. 333-42.
    • (2005) Proceedings of the Twenty-eighth Australasian Conference on Computer Science , vol.38 , pp. 333-342
    • Leung, K.1    Leckie, C.2
  • 54
    • 42949110140 scopus 로고    scopus 로고
    • An efficient clustering scheme to exploit hierarchical data in network traffic analysis
    • A. Mahmood, C. Leckie, and P. Udaya An efficient clustering scheme to exploit hierarchical data in network traffic analysis IEEE Trans Knowl Data Eng 20 6 2008 752 767
    • (2008) IEEE Trans Knowl Data Eng , vol.20 , Issue.6 , pp. 752-767
    • Mahmood, A.1    Leckie, C.2    Udaya, P.3
  • 55
    • 79955011596 scopus 로고    scopus 로고
    • Critical infrastructure protection: Resource efficient sampling to improve detection of less frequent patterns in network traffic
    • A.N. Mahmood, J. Hu, Z. Tari, and C. Leckie Critical infrastructure protection: resource efficient sampling to improve detection of less frequent patterns in network traffic J Netw Comput Appl 33 4 2010 491 502
    • (2010) J Netw Comput Appl , vol.33 , Issue.4 , pp. 491-502
    • Mahmood, A.N.1    Hu, J.2    Tari, Z.3    Leckie, C.4
  • 56
    • 35248857893 scopus 로고    scopus 로고
    • An analysis of the 1999 DARPA/lincoln laboratory evaluation data for network anomaly detection
    • G. Vigna, C. Kruegel, E. Jonsson, Springer Berlin, Heidelberg
    • M. Mahoney, and P. Chan An analysis of the 1999 darpa/lincoln laboratory evaluation data for network anomaly detection G. Vigna, C. Kruegel, E. Jonsson, Recent advances in intrusion detection, Lecture notes in computer science vol. 2820 2003 Springer Berlin, Heidelberg 220 237
    • (2003) Recent Advances in Intrusion Detection, Lecture Notes in Computer Science , vol.2820 , pp. 220-237
    • Mahoney, M.1    Chan, P.2
  • 57
    • 0142126712 scopus 로고    scopus 로고
    • Novelty detection: A review; Part 2: Neural network based approaches
    • M. Markou, and S. Singh Novelty detection: a review; part 2: neural network based approaches Signal Process 83 12 2003 2499 2521
    • (2003) Signal Process , vol.83 , Issue.12 , pp. 2499-2521
    • Markou, M.1    Singh, S.2
  • 60
    • 84950265102 scopus 로고    scopus 로고
    • NSL-KDD, accessed: 2014-12-29
    • NSL-KDD, accessed: 2014-12-29. URL (http://nsl.cs.unb.ca/NSL-KDD/).
  • 64
    • 34250315640 scopus 로고    scopus 로고
    • An overview of anomaly detection techniques: Existing solutions and latest technological trends
    • A. Patcha, and J.-M. Park An overview of anomaly detection techniques: existing solutions and latest technological trends Comput Netw 51 12 2007 3448 3470
    • (2007) Comput Netw , vol.51 , Issue.12 , pp. 3448-3470
    • Patcha, A.1    Park, J.-M.2
  • 65
    • 0001820920 scopus 로고    scopus 로고
    • X-means: Extending k-means with efficient estimation of the number of clusters
    • San Francisco, CA, USA; Morgan Kaufmann Publishers Inc.
    • Pelleg D, Moore AW. X-means: extending k-means with efficient estimation of the number of clusters. In: Proceedings of the seventeenth international conference on machine learning, ICML '00, San Francisco, CA, USA; Morgan Kaufmann Publishers Inc., 2000. p. 727-34.
    • (2000) Proceedings of the Seventeenth International Conference on Machine Learning, ICML '00 , pp. 727-734
    • Pelleg, D.1    Moore, A.W.2
  • 67
    • 84950278884 scopus 로고    scopus 로고
    • PHP: Hypertext processor, accessed: 2014-12-29
    • PHP: Hypertext processor, accessed: 2014-12-29. URL (http://www.php.net).
  • 68
    • 84950243683 scopus 로고    scopus 로고
    • A comprehensive survey of data mining-based fraud detection research
    • Phua C, Lee VCS, Smith-Miles K, Gayler RW. A comprehensive survey of data mining-based fraud detection research, CoRR abs/1009.6119. URL arxiv.org/abs/1009.6119.
    • CoRR abs/1009.6119
    • Phua, C.1    Vcs, L.2    Smith-Miles, K.3    Gayler, R.W.4
  • 72
    • 84950291207 scopus 로고    scopus 로고
    • Predict, accessed: 2014-12-29
    • Predict, accessed: 2014-12-29. URL (www.predict.org).
  • 73
    • 79960922346 scopus 로고    scopus 로고
    • Monitoring abnormal network traffic based on blind source separation approach
    • Dependable multimedia communications: systems, services, and applications
    • T. Qin, X. Guan, W. Li, P. Wang, and Q. Huang Monitoring abnormal network traffic based on blind source separation approach J. Netw. Comput. Appl. 34 5 2011 1732 1742 Dependable multimedia communications: systems, services, and applications
    • (2011) J. Netw. Comput. Appl. , vol.34 , Issue.5 , pp. 1732-1742
    • Qin, T.1    Guan, X.2    Li, W.3    Wang, P.4    Huang, Q.5
  • 76
    • 84885780432 scopus 로고    scopus 로고
    • Evaluation of an adaptive genetic-based signature extraction system for network intrusion detection
    • K. Shafi, and H. Abbass Evaluation of an adaptive genetic-based signature extraction system for network intrusion detection Pattern Anal Appl 16 4 2013 549 566
    • (2013) Pattern Anal Appl , vol.16 , Issue.4 , pp. 549-566
    • Shafi, K.1    Abbass, H.2
  • 77
    • 84859430323 scopus 로고    scopus 로고
    • Toward developing a systematic approach to generate benchmark datasets for intrusion detection
    • A. Shiravi, H. Shiravi, M. Tavallaee, and A.A. Ghorbani Toward developing a systematic approach to generate benchmark datasets for intrusion detection Comput Secur 31 3 2012 357 374
    • (2012) Comput Secur , vol.31 , Issue.3 , pp. 357-374
    • Shiravi, A.1    Shiravi, H.2    Tavallaee, M.3    Ghorbani, A.A.4
  • 79
    • 79251595062 scopus 로고    scopus 로고
    • Using clustering to improve the knn-based classifiers for online anomaly network traffic identification
    • (efficient and robust security and services of wireless mesh networks)
    • M.-Y. Su Using clustering to improve the knn-based classifiers for online anomaly network traffic identification J Netw Comput Appl 34 2 2011 722 730 (efficient and robust security and services of wireless mesh networks)
    • (2011) J Netw Comput Appl , vol.34 , Issue.2 , pp. 722-730
    • Su, M.-Y.1
  • 81
    • 84950244344 scopus 로고    scopus 로고
    • Symantec internet security threat report, accessed: 2014-12-29
    • Symantec internet security threat report, accessed: 2014-12-29. URL (http://www.symantec.com/).
  • 82
    • 84891816613 scopus 로고    scopus 로고
    • A system for denial-of-service attack detection based on multivariate correlation analysis
    • Z. Tan, A. Jamdagni, X. He, P. Nanda, and R.P. Liu A system for denial-of-service attack detection based on multivariate correlation analysis IEEE Trans Parallel Distrib Syst 25 2 2014 447 456
    • (2014) IEEE Trans Parallel Distrib Syst , vol.25 , Issue.2 , pp. 447-456
    • Tan, Z.1    Jamdagni, A.2    He, X.3    Nanda, P.4    Liu, R.P.5
  • 84
    • 85019691440 scopus 로고    scopus 로고
    • Testing intrusion detection systems: A critique of the 1998 and 1999 DARPA intrusion detection system evaluations as performed by lincoln laboratory
    • Testing intrusion detection systems: a critique of the 1998 and 1999 darpa intrusion detection system evaluations as performed by lincoln laboratory. ACM Trans Inf Syst Secur 2000:3(4):262-94.
    • (2000) ACM Trans Inf Syst Secur , vol.3 , Issue.4 , pp. 262-294
  • 85
    • 84950273007 scopus 로고    scopus 로고
    • Thc-hydra, accessed: 2014-12-29
    • Thc-hydra, accessed: 2014-12-29. URL (http://www.thc.org/thc-hydra/).
  • 86
    • 84950253059 scopus 로고    scopus 로고
    • The apache software foundation, accessed: 2014-12-29
    • The apache software foundation, accessed: 2014-12-29. URL (http://apache.org).
  • 87
    • 84950288490 scopus 로고    scopus 로고
    • The Global State of Information Security Survey 2015, accessed: 2015-01-19
    • The Global State of Information Security Survey 2015, accessed: 2015-01-19. URL (http://www.pwc.com).
  • 88
    • 0043166339 scopus 로고    scopus 로고
    • Anomaly detection in IP networks
    • M. Thottan, and C. Ji Anomaly detection in ip networks IEEE Trans Signal Process 51 8 2003 2191 2204
    • (2003) IEEE Trans Signal Process , vol.51 , Issue.8 , pp. 2191-2204
    • Thottan, M.1    Ji, C.2
  • 89
    • 84950294018 scopus 로고    scopus 로고
    • Tikiwiki cms groupware remote php code injection, accessed: 2014-12-29
    • Tikiwiki cms groupware remote php code injection, accessed: 2014-12-29. URL (http://www.exploit-db.com/exploits/18265/).
  • 90
    • 84950258202 scopus 로고    scopus 로고
    • Tikiwiki: Cms groupware, accessed: 2014-12-29
    • Tikiwiki: Cms groupware, accessed: 2014-12-29. URL (http://info.tiki.org/Tiki+Wiki+CMS+Groupware).
  • 91
    • 0033293396 scopus 로고    scopus 로고
    • Towards a taxonomy of intrusion-detection systems
    • Towards a taxonomy of intrusion-detection systems, Comput. Netw. 31 (9) (1999) 805-822.
    • (1999) Comput. Netw. , vol.31 , Issue.9 , pp. 805-822
  • 92
    • 84950286377 scopus 로고    scopus 로고
    • Ubuntu Linux, accessed: 2014-12-29
    • Ubuntu Linux, accessed: 2014-12-29. URL (http://www.ubuntu.com).
  • 94
    • 84950246732 scopus 로고    scopus 로고
    • Verizon's data breach investigation report 2014, accessed: 2014-12-29
    • Verizon's data breach investigation report 2014, accessed: 2014-12-29. URL (http://www.verizonenterprise.com/DBIR/2014/).
  • 95
    • 12244308530 scopus 로고    scopus 로고
    • A nonlinear correlation measure for multivariable data set
    • Q. Wang, Y. Shen, and J.Q. Zhang A nonlinear correlation measure for multivariable data set Phys D: Nonlinear Phenom 200 3-4 2005 287 295
    • (2005) Phys D: Nonlinear Phenom , vol.200 , Issue.3-4 , pp. 287-295
    • Wang, Q.1    Shen, Y.2    Zhang, J.Q.3
  • 96
    • 79956116601 scopus 로고    scopus 로고
    • Anomaly detection in wireless sensor networks: A survey
    • (advanced topics in cloud computing)
    • M. Xie, S. Han, B. Tian, and S. Parvin Anomaly detection in wireless sensor networks: a survey J Netw Comput Appl 34 4 2011 1302 1325 (advanced topics in cloud computing)
    • (2011) J Netw Comput Appl , vol.34 , Issue.4 , pp. 1302-1325
    • Xie, M.1    Han, S.2    Tian, B.3    Parvin, S.4
  • 98
    • 0035271352 scopus 로고    scopus 로고
    • An anomaly detection technique based on a chi-square statistic for detecting intrusions into information systems
    • N. Ye, and Q. Chen An anomaly detection technique based on a chi-square statistic for detecting intrusions into information systems Qual Relaib Eng Int 17 2001 105 112
    • (2001) Qual Relaib Eng Int , vol.17 , pp. 105-112
    • Ye, N.1    Chen, Q.2
  • 100
    • 79960929773 scopus 로고    scopus 로고
    • Intelligent rate control for supporting real-time traffic in wlan mesh networks
    • (dependable multimedia communications: systems, services, and applications)
    • R. Zhu Intelligent rate control for supporting real-time traffic in wlan mesh networks J Netw Comput Appl 34 5 2011 1449 1458 (dependable multimedia communications: systems, services, and applications)
    • (2011) J Netw Comput Appl , vol.34 , Issue.5 , pp. 1449-1458
    • Zhu, R.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.