4.6 Article

An Entropy-Based Network Anomaly Detection Method

Related references

Note: Only part of the references are listed.
Article Physics, Multidisciplinary

Entropy-Based Characterization of Internet Background Radiation

Felix Iglesias et al.

ENTROPY (2015)

Article Computer Science, Information Systems

An empirical comparison of botnet detection methods

S. Garcia et al.

COMPUTERS & SECURITY (2014)

Article Physics, Multidisciplinary

Detection and Modeling of Cyber Attacks with Petri Nets

Bartosz Jasiul et al.

ENTROPY (2014)

Article Computer Science, Theory & Methods

Detection and defense of application-layer DDoS attacks in backbone web traffic

Wei Zhou et al.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2014)

Article Computer Science, Information Systems

ColShield: an effective and collaborative protection shield for the detection and prevention of collaborative flooding of DDoS attacks in wireless mesh networks

I. Diana Jeba Jingle et al.

HUMAN-CENTRIC COMPUTING AND INFORMATION SCIENCES (2014)

Article Computer Science, Artificial Intelligence

Anomaly Detection via Online Oversampling Principal Component Analysis

Yuh-Jye Lee et al.

IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING (2013)

Article Computer Science, Information Systems

Toward developing a systematic approach to generate benchmark datasets for intrusion detection

Ali Shiravi et al.

COMPUTERS & SECURITY (2012)

Article Physics, Multidisciplinary

Tsallis Relative Entropy and Anomalous Diffusion

Janett Prehl et al.

ENTROPY (2012)

Article Computer Science, Information Systems

Evasion Techniques: Sneaking through Your Intrusion Detection/Prevention Systems

Tsung-Huan Cheng et al.

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2012)

Article Computer Science, Artificial Intelligence

An extensive experimental comparison of methods for multi-label learning

Gjorgji Madjarov et al.

PATTERN RECOGNITION (2012)

Article Computer Science, Information Systems

The Cousins of Stuxnet: Duqu, Flame, and Gauss

Boldizsar Bencsath et al.

FUTURE INTERNET (2012)

Article Computer Science, Information Systems

Stuxnet: What Has Changed?

Dorothy E. Denning

FUTURE INTERNET (2012)

Article Computer Science, Information Systems

DoS attacks exploiting signaling in UMTS and IMS

Georgios Kambourakis et al.

COMPUTER COMMUNICATIONS (2011)

Article Computer Science, Hardware & Architecture

Accurate network anomaly classification with generalized entropy metrics

Bernhard Tellenbach et al.

COMPUTER NETWORKS (2011)

Article Computer Science, Information Systems

Analysis of update delays in signature-based network intrusion detection systems

Hugo Gascon et al.

COMPUTERS & SECURITY (2011)

Article Physics, Multidisciplinary

Entropy Measures vs. Kolmogorov Complexity

Andreia Teixeira et al.

ENTROPY (2011)

Review Physics, Multidisciplinary

The Nonadditive Entropy Sq and Its Applications in Physics and Elsewhere: Some Remarks

Constantino Tsallis

ENTROPY (2011)

Article Physics, Multidisciplinary

A Characterization of Entropy in Terms of Information Loss

John C. Baez et al.

ENTROPY (2011)

Article Computer Science, Theory & Methods

Low-Rate DDoS Attacks Detection and Traceback by Using New Information Metrics

Yang Xiang et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2011)

Article Computer Science, Information Systems

An Overview of IP Flow-Based Intrusion Detection

Anna Sperotto et al.

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2010)

Article Engineering, Electrical & Electronic

Fair incentive mechanism with pyramidal structure for peer-to-peer networks

Y. Liu et al.

IET COMMUNICATIONS (2010)

Article Computer Science, Information Systems

Histogram-based traffic anomaly detection

Andreas Kind et al.

IEEE Transactions on Network and Service Management (2010)

Article Computer Science, Theory & Methods

Anomaly detection

Varun Chandola et al.

ACM COMPUTING SURVEYS (2009)

Article Computer Science, Information Systems

Anomaly-based network intrusion detection: Techniques, systems and challenges

P. Garcia-Teodoro et al.

COMPUTERS & SECURITY (2009)

Article Computer Science, Information Systems

A Survey on Internet Traffic Identification

Arthur Callado et al.

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2009)

Article Engineering, Electrical & Electronic

Network Anomaly Detection Based on Wavelet Analysis

Wei Lu et al.

EURASIP JOURNAL ON ADVANCES IN SIGNAL PROCESSING (2009)

Article Physics, Multidisciplinary

Axiomatic Characterizations of Information Measures

Imre Csiszar

ENTROPY (2008)

Article Computer Science, Information Systems

Mutual information applied to anomaly detection

Yuliya Kopylova et al.

JOURNAL OF COMMUNICATIONS AND NETWORKS (2008)

Article Computer Science, Hardware & Architecture

An overview of anomaly detection techniques: Existing solutions and latest technological trends

Animesh Patcha et al.

COMPUTER NETWORKS (2007)

Article Telecommunications

Network anomaly detection using nonextensive entropy

Artur Ziviani et al.

IEEE COMMUNICATIONS LETTERS (2007)

Article Environmental Sciences

Background and threshold: critical comparison of methods of determination

C Reimann et al.

SCIENCE OF THE TOTAL ENVIRONMENT (2005)

Article Physics, Multidisciplinary

A step beyond Tsallis and Renyi entropies

M Masi

PHYSICS LETTERS A (2005)

Article Computer Science, Artificial Intelligence

Logistic model trees

N Landwehr et al.

MACHINE LEARNING (2005)

Article Computer Science, Hardware & Architecture

Robustness of the Markov-chain model for cyber-attack detection

N Ye et al.

IEEE TRANSACTIONS ON RELIABILITY (2004)

Article Computer Science, Artificial Intelligence

A survey of outlier detection methodologies

VJ Hodge et al.

ARTIFICIAL INTELLIGENCE REVIEW (2004)