
doi: 10.1002/sec.1335
AbstractInternet users and computer networks constantly suffer from increasing number of cyberattacks. During the process of seeking how to reduce the risk and possible consequences of the attacks, it is very important to identify the attacks at the initial stage of their realization. For this purpose, the anomaly detection systems, a subset of intrusion detection systems, can be applied. The main advantage of anomaly‐based systems is the ability to detect unknown attacks. We propose a novel approach to detect the network flow anomalies. The method relies on aggregated network flow metrics and is based on local outlier factor algorithm, which evaluates each event's uniqueness on the basis of distance from the k‐nearest neighbours. In our research, 15 different groups of features (a total of 74 features) were suggested to detect anomalous network flows. According to experimental results, the best groups of features were identified with the highest values of precision, recall and F‐measure. Copyright © 2015 John Wiley & Sons, Ltd.
| selected citations These citations are derived from selected sources. This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically). | 26 | |
| popularity This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network. | Top 10% | |
| influence This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically). | Top 10% | |
| impulse This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network. | Average |
