Network Behavior Anomaly Detection

Known as: Network Behavior Analysis 
Network behavior anomaly detection (NBAD) provides one approach to network security threat detection. It is a complementary technology to systems… (More)
Wikipedia

Topic mentions per year

Topic mentions per year

1992-2016
024619922016

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2014
2014
The increasing complexity of software-defined (SDN) applications requires comprehensive methods and tools for debugging and… (More)
Is this relevant?
2013
2013
Malware analysis is the process of dissecting a given malware sample in order to determine its purpose and functionality. It is a… (More)
  • figure 1
  • figure 2
  • figure 3
Is this relevant?
2012
2012
In this paper, a substructure-based network behavior anomaly detection approach, called WFS (Weighted Frequent Subgraphs), is… (More)
  • table 1
  • table 2
  • figure 1
  • table 3
  • figure 3
Is this relevant?
2012
2012
Intrusion detection is the process of monitoring the events occurring in a computer system or network and analyzing them for… (More)
Is this relevant?
2012
2012
Traditional data stream analysis focused mainly on the protocol and the content of the stream, which ignored the behavior… (More)
  • figure 1
  • figure 2
  • figure 3
  • table II
  • table III
Is this relevant?
Highly Cited
2011
Highly Cited
2011
Botnets have become one of the major threats on the Internet for serving as a vector for carrying attacks against organizations… (More)
  • table I
  • figure 2
  • figure 4
  • figure 3
  • figure 7
Is this relevant?
2011
2011
Sampling techniques are widely employed in high-speed network traffic monitoring to allow the analysis of high traffic volumes… (More)
  • table I
  • table II
  • table III
  • figure 1
Is this relevant?
2009
2009
Botnets have become the major sources of spamming, which generates massive unwanted traffic on networks. An effective detection… (More)
  • figure 1
  • figure 2
  • figure 1
Is this relevant?
2008
2008
We present a method that improves the results of network intrusion detection by integration of several anomaly detection… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • table 1
Is this relevant?
2008
2008
Analyzing the characteristic of network behavior provides scientific basis for designing, building, and managing the next… (More)
  • figure 3
  • figure 2
  • figure 4
  • figure 5
  • figure 8
Is this relevant?