Most Read Research Articles


Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79
Call for Paper - May 2015 Edition
IJCA solicits original research papers for the May 2015 Edition. Last date of manuscript submission is April 20, 2015. Read More

Applying Outlier Detection Techniques in Anomaly-based Network Intrusion Systems – A Theoretical Analysis

Print
PDF
IJCA Proceedings on International Seminar on Computer Vision 2013
© 2014 by IJCA Journal
ISCV
Year of Publication: 2014
Authors:
J. Rene Beulah
D. Shalini Punithavathani

Rene J Beulah and Shalini D Punithavathani. Article: Applying Outlier Detection Techniques in Anomaly-based Network Intrusion Systems – A Theoretical Analysis. IJCA Proceedings on International Seminar on Computer Vision 2013 ISCV:6-9, January 2014. Full text available. BibTeX

@article{key:article,
	author = {J. Rene Beulah and D. Shalini Punithavathani},
	title = {Article: Applying Outlier Detection Techniques in Anomaly-based Network Intrusion Systems – A Theoretical Analysis},
	journal = {IJCA Proceedings on International Seminar on Computer Vision 2013},
	year = {2014},
	volume = {ISCV},
	pages = {6-9},
	month = {January},
	note = {Full text available}
}

Abstract

With the advent of the Internet, security has become a major concern. An intrusion detection system is used to enhance the security of networks by inspecting all inbound and outbound network activities and by identifying suspicious patterns as possible intrusions. For the past two decades, many researchers are working in Intrusion Detection Systems. In recent years, anomaly detection has gained popularity with its ability to detect novel attacks. Nowadays researchers focus on applying outlier detection techniques for anomaly detection because of its promising results in identifying true attacks and in reducing false alarm rate. In this paper, some of the works which applied outlier analysis in anomaly detection is studied and their results are analyzed.

References

  • Mahbod Tavallaee, Natalia Stakhanova, Ali Akbar Ghorbani, "Toward Credible Evaluation of Anomaly-Based Intrusion-Detection Methods", IEEE Transactions on Systems, Man and Cybernetics - Part C: Applications and Reviews, Vol. 40, No. 5, September 2010.
  • Bin HUANG, Wen-fang LI, De-li CHEN, Liang SHI, "An Intrusion Detection Method Based on Outlier Ensemble Detection", IEEE International Conference on Networks Security, Wireless Communications and Trusted Computing, 2009.
  • Manowar H Bhuyan, D K Bhattacharyya, J K Kalita, "NADO: Network Anomaly Detection Using Outlier Approach", ICCCS'11 February 12-14, 2011, Rourkela, Odisha, India Copyright © 2011 ACM 978-1-4503-0464-1/11/02.
  • A Mira, D K Bhattacharyya, S Saharia, "RODHA: Robust Outlier Detection using Hybrid Approach", American Journal of Intelligent Systems 2012, 2(5): 129-140.
  • Prasanta Godoi, D K Bhattacharyya, B Borah, Jugal K Kalita, "A Survey of Outlier Detection Methods in Network Anomaly Identification", The Computer Journal, Vol. 54 No. 4, 2011.
  • Fu Xiao, Xie Li. 2008, "Using Outlier Detection to Reduce False Positives in Intrusion Detection", IEEE IFIP International Conference on Network and Parallel Computing, 2008.
  • Komsit Prakobphol, Justin Zhan, "A Novel Outlier Detection Scheme for Network Intrusion Detection Systems", IEEE International Conference on Information Security and Assurance, 2008.
  • Jiong Zhang, Mohammad Zulkernine, Anwar Haque, "Random-Forests-Based Network Intrusion Detection Systems", IEEE Transactions on Systems, Man, Cybernetics - Part C: Applications and Reviews, Vol. 38, No. 5, September 2008.
  • Peng Yang, Biao Huang, "Density Based Outlier Mining Algorithm with Application to Intrusion Detection", IEEE Pacific-Asia Workshop on Computational Intelligence and Industrial Application, 2008.
  • S. Ganapathy, N. Jaisankar, P. Yogesh, A. Kannan, "An Intelligent System for Intrusion Detection Using Outlier Detection", IEEE International Conference on Recent Trends in Information Technology, 2011.
  • Pedro Casas, Johan Mazel, Philippe Owezarski, "UNADA: Unsupervised Network Anomaly Detection Using Sub-space Outliers Ranking
  • David Kershaw, Qignag Gao, Hai Wang, "Anomaly-Based Network Intrusion Detection Using Outlier Subspace Analysis: A Case Study", Canadian AI 2001, LNAI 6657, pp. 234-239, 2011 © Springer-Verlag Berlin Heidelberg 2011.