Näytä suppeat kuvailutiedot

dc.contributor.authorBodström, Tero
dc.contributor.authorHämäläinen, Timo
dc.contributor.editorGalinina, Olga
dc.contributor.editorAndreev, Sergey
dc.contributor.editorBalandin, Sergey
dc.contributor.editorKoucheryavy, Yevgeni
dc.date.accessioned2018-10-26T09:12:31Z
dc.date.available2019-09-30T21:35:34Z
dc.date.issued2018
dc.identifier.citationBodström, T., & Hämäläinen, T. (2018). State of the art literature review on Network Anomaly Detection. In O. Galinina, S. Andreev, S. Balandin, & Y. Koucheryavy (Eds.), <i>NEW2AN : Proceedings of the 18th International Conference on Next Generation Wired/Wireless Advanced Networks and Systems</i> (pp. 89-101). Springer. Lecture Notes in Computer Science, 11118. <a href="https://doi.org/10.1007/978-3-030-01168-0_9" target="_blank">https://doi.org/10.1007/978-3-030-01168-0_9</a>
dc.identifier.otherCONVID_28281623
dc.identifier.otherTUTKAID_78945
dc.identifier.urihttps://jyx.jyu.fi/handle/123456789/59962
dc.description.abstractAs network attacks are evolving along with extreme growth in the amount of data that is present in networks, there is a significant need for faster and more effective anomaly detection methods. Even though current systems perform well when identifying known attacks, previously unknown attacks are still difficult to identify under occurrence. To emphasize, attacks that might have more than one ongoing attack vectors in one network at the same time, or also known as APT (Advanced Persistent Threat) attack, may be hardly notable since it masquerades itself as legitimate traffic. Furthermore, with the help of hiding functionality, this type of attack can even hide in a network for years. Additionally, the expected number of connected devices as well as the fast-paced development caused by the Internet of Things, raises huge risks in cyber security that must be dealt with accordingly. When considering all above-mentioned reasons, there is no doubt that there is plenty of room for more advanced methods in network anomaly detection hence more advanced statistical methods and machine learning based techniques have been proposed recently in detecting anomalies.fi
dc.format.extent705
dc.format.mimetypeapplication/pdf
dc.language.isoeng
dc.publisherSpringer
dc.relation.ispartofNEW2AN : Proceedings of the 18th International Conference on Next Generation Wired/Wireless Advanced Networks and Systems
dc.relation.ispartofseriesLecture Notes in Computer Science
dc.rightsIn Copyright
dc.subject.othernetwork anomaly detection
dc.titleState of the art literature review on Network Anomaly Detection
dc.typeconferenceObject
dc.identifier.urnURN:NBN:fi:jyu-201810044358
dc.contributor.laitosInformaatioteknologian tiedekuntafi
dc.contributor.laitosFaculty of Information Technologyen
dc.contributor.oppiaineTietotekniikkafi
dc.contributor.oppiaineMathematical Information Technologyen
dc.type.urihttp://purl.org/eprint/type/ConferencePaper
dc.date.updated2018-10-04T15:15:11Z
dc.relation.isbn978-3-030-01167-3
dc.type.coarhttp://purl.org/coar/resource_type/c_5794
dc.description.reviewstatuspeerReviewed
dc.format.pagerange89-101
dc.relation.issn0302-9743
dc.relation.numberinseries11118
dc.type.versionacceptedVersion
dc.rights.copyright© Springer Nature Switzerland AG 2018
dc.rights.accesslevelopenAccessfi
dc.relation.conferenceInternational Conference on Next Generation Wired/Wireless Advanced Networks and Systems
dc.subject.ysotietoturva
dc.subject.ysoverkkohyökkäykset
dc.format.contentfulltext
jyx.subject.urihttp://www.yso.fi/onto/yso/p5479
jyx.subject.urihttp://www.yso.fi/onto/yso/p27466
dc.rights.urlhttp://rightsstatements.org/page/InC/1.0/?language=en
dc.relation.doi10.1007/978-3-030-01168-0_9
dc.type.okmA4


Aineistoon kuuluvat tiedostot

Thumbnail

Aineisto kuuluu seuraaviin kokoelmiin

Näytä suppeat kuvailutiedot

In Copyright
Ellei muuten mainita, aineiston lisenssi on In Copyright