Burstiness of Intrusion Detection Process: Empirical Evidence and a Modeling Approach

@article{Harang2017BurstinessOI,
  title={Burstiness of Intrusion Detection Process: Empirical Evidence and a Modeling Approach},
  author={Richard E. Harang and Alexander Kott},
  journal={IEEE Transactions on Information Forensics and Security},
  year={2017},
  volume={12},
  pages={2348-2359}
}
We analyze sets of intrusion detection records observed on the networks of several large, nonresidential organizations protected by a form of intrusion detection and prevention service. Our analyses reveal that the process of intrusion detection in these networks exhibits a significant degree of burstiness as well as strong memory, with burstiness and memory properties that are comparable to those of natural processes driven by threshold effects, but different from bursty human activities. We… CONTINUE READING
Related Discussions
This paper has been referenced on Twitter 1 time. VIEW TWEETS

Citations

Publications citing this paper.

References

Publications referenced by this paper.
Showing 1-10 of 38 references

Bayesian Data Analysis for Data Mining

2002
View 6 Excerpts
Highly Influenced

Temporal clustering of tropical cyclones and its ecosystem impacts.

Proceedings of the National Academy of Sciences of the United States of America • 2011

A non-universal aspect in the temporal occurrence of earthquakes

X. Zhao, T. Omi, N. Matsuno, S. Shinomoto
New J. Phys., vol. 12, no. 6, p. 063010, 2010. • 2010

Detecting and characterizing social spam campaigns

ACM Conference on Computer and Communications Security • 2010

Similar Papers

Loading similar papers…