Publication | Open Access
Transaction-based Anomaly Detection
14
Citations
11
References
1999
Year
Anomaly DetectionEngineeringInformation SecurityInformation ForensicsTransaction-based Anomaly DetectionData ScienceData MiningData Communication NetworksData ManagementNetwork SecurityIntrusion Detection SystemOutlier DetectionKnowledge DiscoveryIntrusion ToleranceData PrivacyComputer ScienceNetwork ForensicsData SecurityCryptographyNovelty Detection
The increasing complexity of both tele and data communication networks yields new demands concerning network security. Especially the task of detecting, repulsing and preventing abuse by in- and outsiders is becoming more and more difficult. This paper deals with a new technique that appears to be suitable for solving these issues, i.e. anomaly detection based on the specification of transactions. The traditional transaction and serialization concepts are discussed, and a new model of anomaly detection, based on the concept of transactions, is introduced. Applying this model to known attacks gives a first insight concerning the feasibility of our approach.
| Year | Citations | |
|---|---|---|
Page 1
Page 1