Unexpected-Behavior Detection Using TopK Rankings for Cybersecurity

Anomaly-based intrusion detection systems use profiles to characterize expected behavior of network users. Most of these systems characterize the entire network traffic within a single profile. This work proposes a user-level anomaly-based intrusion detection methodology using only the user&#821...

Full description

Bibliographic Details
Main Authors: Alvaro Parres-Peredo, Ivan Piza-Davila, Francisco Cervantes
Format: Article
Language:English
Published: MDPI AG 2019-10-01
Series:Applied Sciences
Subjects:
Online Access:https://www.mdpi.com/2076-3417/9/20/4381