A Hybrid Column and Constraint Generation Method for Network Behavior Anomaly Detection

Author(s):  
Mengxue Deng ◽  
Xinrong Wu ◽  
Pu Chen ◽  
Weijun Zeng
2022 ◽  
pp. 102600
Author(s):  
Aiguo Chen ◽  
Yang Fu ◽  
Xu Zheng ◽  
Guoming lu

2018 ◽  
Vol 23 (5) ◽  
pp. 561-573 ◽  
Author(s):  
Xiaoming Ye ◽  
Xingshu Chen ◽  
Dunhu Liu ◽  
Wenxian Wang ◽  
Li Yang ◽  
...  

2017 ◽  
Vol 1 (1) ◽  
pp. 35
Author(s):  
Billal Hadian ◽  
Erick Paulus ◽  
Deni Setiana

Mendeteksi dan memahami anomali dalam aktifitas jaringan merupakan topik yang menjanjikan di bidang keamanan jaringan. Threat atau ancaman keamanan dapat ditemukan dengan mempelajari anomali atau penyimpangan yang terjadi pada jaringan yang diamati. Dalam penelitian ini akan dibahas prosedur pendeteksian anomali dalam aktifitas jaringan, serta klasifikasi dan karakteristik dari threat yang mungkin menjadi penyebab anomali tersebut. Data aktifitas jaringan yang digunakan dalam penelitian ini diperoleh dari proses pemantauan secara langsung, yang diharapkan akan mampu merepresentasikan aktifitas jaringan dalam keadaan sebenarnya. Di bagian akhir penelitian ini akan dilaporkan temuan – temuan yang berhasil didapatkan selama penelitian berlangsung, serta kaitannya dengan aktifitas jaringan dalam kondisi operasional sehari-hari.


Information ◽  
2019 ◽  
Vol 10 (8) ◽  
pp. 262
Author(s):  
Ying Zhao ◽  
Junjun Chen ◽  
Di Wu ◽  
Jian Teng ◽  
Nabin Sharma ◽  
...  

Anomaly detection of network traffic flows is a non-trivial problem in the field of network security due to the complexity of network traffic. However, most machine learning-based detection methods focus on network anomaly detection but ignore the user anomaly behavior detection. In real scenarios, the anomaly network behavior may harm the user interests. In this paper, we propose an anomaly detection model based on time-decay closed frequent patterns to address this problem. The model mines closed frequent patterns from the network traffic of each user and uses a time-decay factor to distinguish the weight of current and historical network traffic. Because of the dynamic nature of user network behavior, a detection model update strategy is provided in the anomaly detection framework. Additionally, the closed frequent patterns can provide interpretable explanations for anomalies. Experimental results show that the proposed method can detect user behavior anomaly, and the network anomaly detection performance achieved by the proposed method is similar to the state-of-the-art methods and significantly better than the baseline methods.


2017 ◽  
Vol 36 (6) ◽  
pp. 577-586 ◽  
Author(s):  
Emily Long ◽  
Tyson S. Barrett ◽  
Ginger Lockhart

2018 ◽  
Vol 18 (1) ◽  
pp. 20-32 ◽  
Author(s):  
Jong-Min Kim ◽  
Jaiwook Baik

2016 ◽  
Vol 136 (3) ◽  
pp. 363-372
Author(s):  
Takaaki Nakamura ◽  
Makoto Imamura ◽  
Masashi Tatedoko ◽  
Norio Hirai

Sign in / Sign up

Export Citation Format

Share Document