528
Views
0
CrossRef citations to date
0
Altmetric
Articles

Establishment and mapping of heterogeneous anomalies in network intrusion datasets

ORCID Icon, ORCID Icon & ORCID Icon
Pages 2755-2783 | Received 16 Jun 2022, Accepted 20 Nov 2022, Published online: 10 Dec 2022

References

  • Ahmed, M. (2019). Data summarization: a survey. Knowledge and Information Systems, 58(2), 249–273. https://doi.org/10.1007/s10115-018-1183-0
  • Ahmed, M., Mahmood, A. N., & Hu, J. (2016). A survey of network anomaly detection techniques. Journal of Network and Computer Applications, 60(1), 19–31. https://doi.org/10.1016/j.jnca.2015.11.016
  • Araya, D. B., Grolinger, K., ElYamany, H. F., Capretz, M. A., & Bitsuamlak, G.. (2016). Collective contextual anomaly detection framework for smart buildings. International Joint Conference on Neural Networks (IJCNN). https://doi.org/10.1109/IJCNN.2016.7727242
  • Ariyaluran Habeeb, R. A., Nasaruddin, F., Gani, A., Hashem, I., Ahmed, E., & Imran, M. (2018). Real-time big data processing for anomaly detection: a survey. International Journal of Information Management, 45(1), 289–307. https://doi.org/10.1016/j.ijinfomgt.2018.08.006
  • Beer, F., & Bühler, U.. (2017). Feature selection for flow-based intrusion detection using Rough Set Theory. IEEE 14th International Conference on Networking, Sensing and Control (ICNSC). https://doi.org/10.1109/ICNSC.2017.8000162
  • Beer, F., Hofer, T., Karimi, D., & Bühler, U.. (2017). 10. DFN-Forum Kommunikationstechnologien (pp. 11–20). Gesellschaft für Informatik e.V..
  • Bhuyan, M. H., Bhattacharyya, D. K., & Kalita, J. K. (2013). Network anomaly detection: methods, systems and tools. IEEE Communications Surveys & Tutorials, 16(1), 303–336. https://doi.org/10.1109/SURV.2013.052213.00046
  • Bovenzi, G., Aceto, G., Ciuonzo, D., Persico, V., & Pescapé, A.. (2020). A Hierarchical Hybrid Intrusion Detection Approach in IoT Scenarios. GLOBECOM 2020: IEEE Global Communications Conference. https://doi.org/10.1109/GLOBECOM42002.2020.9348167
  • Chandola, V., Banerjee, A., & Kumar, V. (2009). Anomaly detection: A survey. ACM Computing Surveys (CSUR), 41(3), 1–58. https://doi.org/10.1145/1541880.1541882
  • Chatterjee, A., & Ahmed, B. S. (2022). IoT anomaly detection methods and applications: a survey. Internet of Things, 19(1).https://doi.org/10.1016/j.iot.2022.100568
  • Chen, L., Gao, S., & Cao, X. (2020). Research on real-time outlier detection over big data streams. International Journal of Computers and Applications, 42(1), 93–101. https://doi.org/10.1080/1206212X.2017.1397388
  • Chen, W., Wang, Z., Zhong, Y., Han, D., Duan, C., Yin, X., Yang, J., & Shi, X.. (2021). ADSIM: Network Anomaly Detection via Similarity-aware Heterogeneous Ensemble Learning. 2021 IFIP/IEEE International Symposium on Integrated Network Management (IM). https://ieeexplore.ieee.org/document/9463987
  • Cisco, U. (2020). Cisco annual internet report (2018–2023) white paper.
  • Dahiya, P., & Srivastava, D. K.. (2018). A comparative evolution of unsupervised techniques for effective network intrusion detection in hadoop. International conference on advances in computing and data sciences. https://doi.org/10.1007/978-981-13-1813-9_28
  • Dou, S., Yang, K., & Poor, H. V. (2019). PC 2 A: predicting collective contextual anomalies via LSTM with deep generative model. IEEE Internet of Things Journal, 6(6), 9645–9655. https://doi.org/10.1109/JIOT.2019.2930202
  • Fernandes, G., Rodrigues, J. J., Carvalho, L. F., Al-Muhtadi, J. F., & Proença, M. L. (2019). A comprehensive survey on network anomaly detection. Telecommunication Systems, 70(3), 447–489. https://doi.org/10.1007/s11235-018-0475-8
  • Guarino, I., Bovenzi, G., Di Monda, D., Aceto, G., Ciuonzo, D., & Pescapé, A.. (2022). On the use of Machine Learning Approaches for the Early Classification in Network Intrusion Detection. 2022 IEEE International Symposium on Measurements & Networking (M&N). https://doi.org/10.1109/MN55117.2022.9887775
  • Hu, G., Wang, J., Liu, Y., Ke, W., & Lin, Y.. (2021). CCAD: A Collective Contextual Anomaly Detection Framework for KPI Data Stream. International Conference on Neural Information Processing. https://doi.org/10.1007/978-3-030-92307-5_53
  • Jiang, Y., Zeng, C., Xu, J., & Li, T.. (2014). Real time contextual collective anomaly detection over multiple data streams. Proceedings of the ODD, 20–30. https://www.semanticscholar.org/paper/Real-time-contextual-collective-anomaly-detection-Jiang-Zeng/c878f99c2f0bb4be290f082470d803acf4048b16
  • Kendall, K. K. R.. (1999). A database of computer attacks for the evaluation of intrusion detection systems (Thesis). Massachusetts Institute of Technology.
  • Kiani, R., Keshavarzi, A., & Bohlouli, M. (2020). Detection of thin boundaries between different types of anomalies in outlier detection using enhanced neural networks. Applied Artificial Intelligence, 34(5), 345–377. https://doi.org/10.1080/08839514.2020.1722933
  • Lee, C., Yi, L., Tan, L. H., Goh, W., Lee, B. S., & Yeo, C. K.. (2014). A Wavelet Entropy-Based Change Point Detection on Network Traffic: A Case Study of Heartbleed Vulnerability. 2014 IEEE 6th International Conference on Cloud Computing Technology and Science. https://doi.org/10.1109/CloudCom.2014.78
  • Mirsky, Y., Doitshman, T., Elovici, Y., & Shabtai, A.. (2018). Kitsune: An Ensemble of Autoencoders for Online Network Intrusion Detection. Network and Distributed Systems Security Symposium (NDSS) 2018. https://doi.org/10.48550/arXiv.1802.09089
  • Morgan, S. (2020). Cybercrime to cost the world $10.5 trillion annually by 2025 (Vol. 13) (No.11).
  • Moustafa, N., Creech, G., & Slay, J.. (2017). Data Analytics and Decision Support for Cybersecurity (1, pp. 127–156). Springer International Publishing. https://doi.org/10.1007/978-3-319-59439-2_5
  • Moustafa, N., Hu, J., & Slay, J. (2019). A holistic review of network anomaly detection systems: a comprehensive survey. Journal of Network and Computer Applications, 128(1), 33–55. https://doi.org/10.1016/j.jnca.2018.12.006
  • Moustafa, N., & Slay, J.. (2015). UNSW-NB15: a comprehensive data set for network intrusion detection systems (UNSW-NB15 network data set). 2015 Military Communications and Information Systems Conference (MilCIS). https://doi.org/10.1109/MilCIS.2015.7348942
  • Moustafa, N., & Slay, J. (2016). The evaluation of network anomaly detection systems: statistical analysis of the UNSW-NB15 data set and the comparison with the KDD99 data set. Information Security Journal: A Global Perspective, 25(1-3), 18–31. https://doi.org/10.1080/19393555.2015.1125974
  • Moustafa, N., Slay, J., & Creech, G. (2017). Novel geometric area analysis technique for anomaly detection using trapezoidal area estimation on large-scale networks. IEEE Transactions on Big Data, 5(4), 481–494. https://doi.org/10.1109/TBDATA.2017.2715166
  • Sarhan, M., Layeghy, S., Moustafa, N., & Portmann, M.. (2020). Big Data Technologies and Applications (1ed., pp. 117–135). Springer International Publishing. https://doi.org/10.1007/978-3-030-72802-1_9
  • Sharafaldin, I., Lashkari, A. H., & Ghorbani, A. A.. (2018). Toward generating a new intrusion detection dataset and intrusion traffic characterization. Proceedings of the 4th International Conference on Information Systems Security and Privacy - ICISSP. https://doi.org/10.5220/0006639801080116
  • Zhou, L., & Guo, H.. (2018). Anomaly Detection Methods for IIoT Networks. 2018 IEEE International Conference on Service Operations and Logistics, and Informatics (SOLI). https://doi.org/10.1109/SOLI.2018.8476769
  • Zoppi, T., Ceccarelli, A., Capecchi, T., & Bondavalli, A. (2021). Unsupervised anomaly detectors to detect intrusions in the current threat landscape. ACM/IMS Transactions on Data Science, 2(2), 1–26. https://doi.org/10.1145/3441140
  • Zoppi, T., Ceccarelli, A., Salani, L., & Bondavalli, A.. (2020). On the educated selection of unsupervised algorithms via attacks and anomaly classes. Journal of Information Security and Applications, 52(1). https://doi.org/10.1016/j.jisa.2020.102474