AN EFFECTIVE WAY TO DETECT COMPUTER NETWORK ANOMALIES
Keywords:
Anomaly detection, network level detection, app level detection, mobile security, Android security.Abstract
With increased threat on the network, the detection of network anomalies is becoming more complicated. This thesis looked at anomaly detection by modeling a computer network as a temporary network.
References
Chandola, V., Banerjee, A., and Kumar, V. (2009) Anomaly detection: A survey. ACM Computing Surveys (CSUR), 41, 15:158.
Ahmed M, Mahmood A N, Hu J. A Survey of Network Anomaly Detection Techniques[J]. Journal of Network and Computer Applications, 2015, 60:19-31.
Yu W, Aggarwal CC, Ma S, Wang H. On anomalous hotspot discovery in graph streams. In: Proceedings of the 13th IEEE International Conference on Data Mining (ICDM), Dallas, TX, 2013.
Ide, T. and Kashima, H., Eigenspace-Based Anomaly Detection in Computer Sys- tems, ACM SIGKDD 2004, pp.440-449.
Eslami M, Zheng G, Eramian H, et al. Anomaly detection on bipartite graphs for cyber situational awareness and threat detection[C]// 2017 IEEE International Conference on Big Data (Big Data). IEEE, 2017.
SCXIDS2012)[OL].https://www.unb.ca/cic/datasets/ids.html Canadian Institute for Cybersecurity.