Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

Network Behavior Anomaly Detection

Known as: Network Behavior Analysis 
Network behavior anomaly detection (NBAD) provides one approach to network security threat detection. It is a complementary technology to systems… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2016
2016
We suggest a collaborative approach for revealing malicious behaviors on Android smartphones by which monitoring four observable… Expand
  • figure 1
  • figure 2
  • table II
  • table III
  • table VI
Is this relevant?
2012
2012
Traditional data stream analysis focused mainly on the protocol and the content of the stream, which ignored the behavior… Expand
  • figure 1
  • figure 2
  • figure 3
  • table II
  • table III
Is this relevant?
2012
2012
Most existing approaches for detecting Trojan are limited for obfuscation and encryption techniques. In this paper, we present a… Expand
Is this relevant?
2012
2012
In this paper, a substructure-based network behavior anomaly detection approach, called WFS (Weighted Frequent Subgraphs), is… Expand
  • table 1
  • table 2
  • figure 1
  • table 3
  • figure 3
Is this relevant?
Highly Cited
2011
Highly Cited
2011
Botnets have become one of the major threats on the Internet for serving as a vector for carrying attacks against organizations… Expand
  • table I
  • figure 2
  • figure 4
  • figure 3
  • figure 7
Is this relevant?
2011
2011
Sampling techniques are widely employed in high-speed network traffic monitoring to allow the analysis of high traffic volumes… Expand
  • table I
  • table II
  • table III
  • figure 1
Is this relevant?
2009
2009
Botnets have become the major sources of spamming, which generates massive unwanted traffic on networks. An effective detection… Expand
  • figure 1
  • figure 2
  • figure 1
Is this relevant?
2008
2008
We present a method that improves the results of network intrusion detection by integrating several anomaly detection algorithms… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • table 1
Is this relevant?
2003
2003
The distributed passive measurement is an important technique for network behavior research. But it is very difficult to measure… Expand
Is this relevant?
2002
2002
A new sampling model for measurement using packet identification on IP network is provided under a principle of the PSAMP, a… Expand
  • figure 2
  • figure 10
  • figure 9
Is this relevant?