International Seminar on Computer Vision 2013 |
Foundation of Computer Science USA |
ISCV - Number 1 |
January 2014 |
Authors: J. Rene Beulah, D. Shalini Punithavathani |
d6bedb75-2ed1-4c32-aa05-e7e9fed60901 |
J. Rene Beulah, D. Shalini Punithavathani . Applying Outlier Detection Techniques in Anomaly-based Network Intrusion Systems A Theoretical Analysis. International Seminar on Computer Vision 2013. ISCV, 1 (January 2014), 6-9.
With the advent of the Internet, security has become a major concern. An intrusion detection system is used to enhance the security of networks by inspecting all inbound and outbound network activities and by identifying suspicious patterns as possible intrusions. For the past two decades, many researchers are working in Intrusion Detection Systems. In recent years, anomaly detection has gained popularity with its ability to detect novel attacks. Nowadays researchers focus on applying outlier detection techniques for anomaly detection because of its promising results in identifying true attacks and in reducing false alarm rate. In this paper, some of the works which applied outlier analysis in anomaly detection is studied and their results are analyzed.