Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 223,807,823 papers from all fields of science
Search
Sign In
Create Free Account
Network Behavior Anomaly Detection
Known as:
Network Behavior Analysis
Network behavior anomaly detection (NBAD) provides one approach to network security threat detection. It is a complementary technology to systems…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
6 relations
Argus - Audit Record Generation and Utilization System
Firewall (computing)
Log analysis
MAC address
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2019
2019
The Effect of JCPOA on the Network Behavior Analysis of Tehran Stock Exchange Indexes
S. Abbasian-Naghneh
,
R. Tehrani
,
M. Tamimi
2019
Corpus ID: 214544845
The purpose of this paper is investigating the effect of JCPOA on the network behavior analysis of Tehran Stock Exchange indexes…
Expand
2016
2016
Mobile User Network Behavior Analysis Based on Improved Fuzzy C-Means Clustering
Qingshan Li
International Conference on Intelligent…
2016
Corpus ID: 22625314
Because the traditional mobile user network behavior analysis lacks of data mining and analysis means, which leads to corporate…
Expand
2014
2014
Improved Detection of P2P Botnets through Network Behavior Analysis
Shree Garg
,
A. Sarje
,
S. K. Peddoju
International Conference on Application and…
2014
Corpus ID: 35961445
Botnets are becoming powerful threats on the Internet because they launch targeted attacks towards organizations and the…
Expand
2013
2013
iPanda: A comprehensive malware analysis tool
Peidai Xie
,
Xicheng Lu
,
Jinshu Su
,
Yongjun Wang
,
Meijian Li
International Conference on Information…
2013
Corpus ID: 16259808
Malware analysis is the process of dissecting a given malware sample in order to determine its purpose and functionality. It is a…
Expand
2012
2012
User behavior analyses based on network data stream scenario
Hao Wei
,
Xing-yuan Chen
,
Chao Wang
IEEE 14th International Conference on…
2012
Corpus ID: 43230701
Traditional data stream analysis focused mainly on the protocol and the content of the stream, which ignored the behavior…
Expand
2012
2012
A novel approach of detecting Trojan based on network behavior analysis
Shicong Li
,
Xiao-chun Yun
,
Yongzheng Zhang
,
Yi Pang
,
Tao Yin
2012
Corpus ID: 62238442
Most existing approaches for detecting Trojan are limited for obfuscation and encryption techniques. In this paper, we present a…
Expand
2011
2011
Optimizing flow sampling for network anomaly detection
Karel Bartos
,
M. Rehák
,
Vojtech Krmicek
International Wireless Communications & Mobile…
2011
Corpus ID: 15199729
Sampling techniques are widely employed in high-speed network traffic monitoring to allow the analysis of high traffic volumes…
Expand
2009
2009
Email Shape Analysis for Spam Botnet Detection
P. Sroufe
,
S. Phithakkitnukoon
,
R. Dantu
,
J. Cangussu
6th IEEE Consumer Communications and Networking…
2009
Corpus ID: 529229
Botnets have become the major sources of spamming, which generates massive unwanted traffic on networks. An effective detection…
Expand
2008
2008
AMCAS: An Automatic Malicious Code Analysis System
Jia Zhang
,
Yuntao Guan
,
Xiaoxin Jiang
,
Haixin Duan
,
Jianping Wu
The Ninth International Conference on Web-Age…
2008
Corpus ID: 19007462
With the development of malicious code technology, the number of malicious code has continued to increase. So it is imperative to…
Expand
2003
2003
Distributed Sampling Measurement Model in a High Speed Network Based on Statistical Analysis
Cheng Guang
2003
Corpus ID: 62992593
The distributed passive measurement is an important technique for network behavior research. But it is very difficult to measure…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE