Cited By
View all- Friedberg ISkopik FSettanni GFiedler R(2015)Combating advanced persistent threatsComputers and Security10.1016/j.cose.2014.09.00648:C(35-57)Online publication date: 1-Feb-2015
Unlike signature or misuse based intrusion detection techniques, anomaly detection is capable of detecting novel attacks. However, the use of anomaly detection in practice is hampered by a high rate of false alarms. Specification-based techniques have ...
Intrusion detection system is a primary defense mechanism in aspect of protecting network security. Anomaly detection, as one of the most commonly used intrusion detection methods, plays a significant part in detecting the network traffic data. However,...
This tutorial will present an overview of program anomaly detection, which analyzes normal program behaviors and discovers aberrant executions caused by attacks, misconfigurations, program bugs, and unusual usage patterns. It was first introduced as an ...
IEEE Computer Society
United States