IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Anomaly-Based Intrusion Detection: Adapting to Present and Forthcoming Communication Environments

Anomaly-Based Intrusion Detection: Adapting to Present and Forthcoming Communication Environments
View Sample PDF
Author(s): Jorge Maestre Vidal (Indra, Spain), Marco Antonio Sotelo Monge (Universidad Complutense de Madrid, Spain) and Sergio Mauricio Martínez Monterrubio (Universidad Complutense de Madrid, Spain)
Copyright: 2020
Pages: 24
Source title: Handbook of Research on Machine and Deep Learning Applications for Cyber Security
Source Author(s)/Editor(s): Padmavathi Ganapathi (Avinashilingam Institute for Home Science and Higher Education for Women, India) and D. Shanmugapriya (Avinashilingam Institute for Home Science and Higher Education for Women, India)
DOI: 10.4018/978-1-5225-9611-0.ch010

Purchase

View Anomaly-Based Intrusion Detection: Adapting to Present and Forthcoming Communication Environments on the publisher's website for pricing and purchasing information.

Abstract

Anomaly-based intrusion detection has become an indispensable player on the existing cybersecurity landscape, where it enables the identification of suspicious behaviors that significantly differ from normal activities. In this way, it is possible to discover never-seen-before threats and provide zero-day recognition capabilities. But the recent advances on communication technologies are leading to changes in the monitoring scenarios that result in novel challenges to be taken into consideration, as is the case of greater data heterogeneity, adversarial attacks, energy consumption, or lack of up-to-date datasets. With the aim on bringing the reader closer to them, this chapter deepens the following topics: evolution of the anomaly definition, anomaly recognition for network-based intrusion detection, outlier characterizations, knowledge acquisition for usage modelling, distances and similarity measures for decision-making, anomaly recognition and non-stationarity, metrics and evaluation methodologies, and challenges related with the emergent monitorization environments.

Related Content

Renu Sharma, Mamta Mohan. © 2022. 25 pages.
Kirandeep Bedi, Monica Bedi, Ramanjeet Singh. © 2022. 14 pages.
Darshana Desai. © 2022. 14 pages.
Abhinav Chaturvedi, Mukesh Chaturvedi. © 2022. 16 pages.
Nidhi Shridhar Natrajan, Sanjeev Kumar Singh, Rinku Sanjeev. © 2022. 22 pages.
Shailja Dixit. © 2022. 23 pages.
Surabhi Singh, José Duarte Santos. © 2022. 12 pages.
Body Bottom