Application of Histogram-Based Outlier Scores to Detect Computer Network Anomalies
Misuse activity in computer networks constantly creates new challenges and difficulties to ensure data confidentiality, integrity, and availability. The capability to identify and quickly stop the attacks is essential, as the undetected and successful attack may cause losses of critical resources. T...
Main Authors: | , |
---|---|
Format: | Article |
Language: | English |
Published: |
MDPI AG
2019-11-01
|
Series: | Electronics |
Subjects: | |
Online Access: | https://www.mdpi.com/2079-9292/8/11/1251 |
id |
doaj-41fd626c3c174f078a293697311a3cd4 |
---|---|
record_format |
Article |
spelling |
doaj-41fd626c3c174f078a293697311a3cd42020-11-24T21:56:15ZengMDPI AGElectronics2079-92922019-11-01811125110.3390/electronics8111251electronics8111251Application of Histogram-Based Outlier Scores to Detect Computer Network AnomaliesNerijus Paulauskas0Algirdas Baskys1Department of Computer Science and Communications Technologies, Vilnius Gediminas Technical University, Naugarduko st. 41, LT-03227 Vilnius, LithuaniaDepartment of Computer Science and Communications Technologies, Vilnius Gediminas Technical University, Naugarduko st. 41, LT-03227 Vilnius, LithuaniaMisuse activity in computer networks constantly creates new challenges and difficulties to ensure data confidentiality, integrity, and availability. The capability to identify and quickly stop the attacks is essential, as the undetected and successful attack may cause losses of critical resources. The anomaly-based intrusion detection system (IDS) is a valuable security tool that is capable of detecting new, previously unseen attacks. Anomaly-based IDS sends an alarm when it detects an event that deviates from the behavior characterized as normal. This paper analyses the use of the histogram-based outlier score (HBOS) to detect anomalies in the computer network. Experimental results of different histogram creation methods and the influence of the number of bins on the performance of anomaly detection are presented. Experiments were conducted using an NSL-KDD dataset.https://www.mdpi.com/2079-9292/8/11/1251anomaly detectionintrusion detectionnetwork securityhistogram-based outlier score (hbos) |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
Nerijus Paulauskas Algirdas Baskys |
spellingShingle |
Nerijus Paulauskas Algirdas Baskys Application of Histogram-Based Outlier Scores to Detect Computer Network Anomalies Electronics anomaly detection intrusion detection network security histogram-based outlier score (hbos) |
author_facet |
Nerijus Paulauskas Algirdas Baskys |
author_sort |
Nerijus Paulauskas |
title |
Application of Histogram-Based Outlier Scores to Detect Computer Network Anomalies |
title_short |
Application of Histogram-Based Outlier Scores to Detect Computer Network Anomalies |
title_full |
Application of Histogram-Based Outlier Scores to Detect Computer Network Anomalies |
title_fullStr |
Application of Histogram-Based Outlier Scores to Detect Computer Network Anomalies |
title_full_unstemmed |
Application of Histogram-Based Outlier Scores to Detect Computer Network Anomalies |
title_sort |
application of histogram-based outlier scores to detect computer network anomalies |
publisher |
MDPI AG |
series |
Electronics |
issn |
2079-9292 |
publishDate |
2019-11-01 |
description |
Misuse activity in computer networks constantly creates new challenges and difficulties to ensure data confidentiality, integrity, and availability. The capability to identify and quickly stop the attacks is essential, as the undetected and successful attack may cause losses of critical resources. The anomaly-based intrusion detection system (IDS) is a valuable security tool that is capable of detecting new, previously unseen attacks. Anomaly-based IDS sends an alarm when it detects an event that deviates from the behavior characterized as normal. This paper analyses the use of the histogram-based outlier score (HBOS) to detect anomalies in the computer network. Experimental results of different histogram creation methods and the influence of the number of bins on the performance of anomaly detection are presented. Experiments were conducted using an NSL-KDD dataset. |
topic |
anomaly detection intrusion detection network security histogram-based outlier score (hbos) |
url |
https://www.mdpi.com/2079-9292/8/11/1251 |
work_keys_str_mv |
AT nerijuspaulauskas applicationofhistogrambasedoutlierscorestodetectcomputernetworkanomalies AT algirdasbaskys applicationofhistogrambasedoutlierscorestodetectcomputernetworkanomalies |
_version_ |
1725858965854617600 |