【24h】

An overview of flow-based anomaly detection

机译:基于流的异常检测概述

获取原文
获取原文并翻译 | 示例
       

摘要

Intrusions in computer networks are handled using misuse or anomaly-based solutions. Deep packet inspection is generally incorporated in solutions for better detection and mitigation but with the growth of networks at exponential speed, it has become an expensive solution and makes real-time detection difficult. In this paper, network flows-based anomaly detection techniques are reviewed. The review starts with motivation behind using network flows and justifies why flow-based anomaly detection is the need of the hour. Flow-based datasets are also investigated and reviewed. The main focus is on techniques and methodologies used by researchers for anomaly detection in computer networks. The techniques reviewed are categorised into five classes: statistical, machine learning, clustering, frequent pattern mining and agent-based. At the end the core research problems and open challenges are discussed.
机译:使用滥用或基于异常的解决方案来处理计算机网络中的入侵。深度数据包检查通常被集成到解决方案中,以实现更好的检测和缓解,但是随着网络以指数速度增长,它已成为一种昂贵的解决方案,并且使实时检测变得困难。本文综述了基于网络流量的异常检测技术。审查从使用网络流量的动机开始,并说明了为什么需要基于流量的异常检测。还对基于流的数据集进行了调查和审查。研究人员主要研究计算机网络中异常检测所使用的技术和方法。所审查的技术分为五类:统计,机器学习,聚类,频繁模式挖掘和基于代理。最后讨论了核心研究问题和开放挑战。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号