Feature selection in anomaly-based network intrusion detection systems
Authors
Date
2010Access restrictions
This material has a restricted access due to copyright reasons. It can be read at the workstation at Jyväskylä University Library reserved for the use of archival materials: https://kirjasto.jyu.fi/collections/archival-workstation.
Copyright
This publication is copyrighted. You may download, display and print it for Your own personal use. Commercial use is prohibited.
Related items
Showing items with similar title or keywords.
-
Unsupervised network intrusion detection systems for zero-day fast-spreading network attacks and botnets
Vahdani Amoli, Payam (University of Jyväskylä, 2015)Today, the occurrence of zero-day and complex attacks in high-speed networks is increasingly common due to the high number vulnerabilities in the cyber world. As a result, intrusions become more sophisticated and fast ... -
A method for anomaly detection in hyperspectral images, using deep convolutional autoencoders
Penttilä, Jeremias (2017)Menetelmä poikkeavuuksien havaitsemiseen hyperspektrikuvista käyttäen syviä konvolutiivisia autoenkoodereita. Poikkeavuuksien havaitseminen kuvista, erityisesti hyperspektraalisista kuvista, on hankalaa. Kun ongelmaan ... -
Anomaly-based online intrusion detection system as a sensor for cyber security situational awareness system
Kokkonen, Tero (University of Jyväskylä, 2016)Almost all the organisations and even individuals rely on complex structures of data networks and networked computer systems. That complex data ensemble, the cyber domain, provides great opportunities, but at the same ... -
Dimensionality reduction framework for detecting anomalies from network logs
Sipola, Tuomo; Juvonen, Antti; Lehtonen, Joel (CRL Publishing, 2012)Dynamic web services are vulnerable to multitude of intrusions that could be previously unknown. Server logs contain vast amounts of information about network traffic, and finding attacks from these logs improves the ... -
On Application-Layer DDoS Attack Detection in High-Speed Encrypted Networks
Zolotukhin, Mikhail; Kokkonen, Tero; Hämäläinen, Timo; Siltanen, Jarmo (Advanced Institute of Convergence IT, 2016)Application-layer denial-of-service attacks have become a serious threat to modern high-speed computer networks and systems. Unlike network-layer attacks, application-layer attacks can be performed by using legitimate ...