The Community for Technology Leaders
RSS Icon
Subscribe
Issue No.01 - Jan.-Feb. (2013 vol.15)
pp: 8-11
Char Sample , Capitol College
Kim Schaffer , Capitol College
ABSTRACT
Security automation continues to depend on signature models, but vulnerability exploitation is exceeding the abilities of such models. The authors, in reviewing the different types of mathematical-based constructs in anomaly detection, reveal how anomaly detection can enhance network security by potentially solving problems that signature models can't address.
INDEX TERMS
information technology, network security, anomaly detection
CITATION
Char Sample, Kim Schaffer, "An Overview of Anomaly Detection", IT Professional, vol.15, no. 1, pp. 8-11, Jan.-Feb. 2013, doi:10.1109/MITP.2013.7
REFERENCES
1. B. Bencsáth et al., "Duqu: Analysis, Detection, and Lessons Learned," Proc. ACM European Workshop on System Security (EuroSec 12), vol. 2012, 2012; www.crysys.hu/publications/filesBencsathPBF12eurosec.pdf .
2. I. Van Sprundel, "Fuzzing: Breaking Software in an Automated Fashion," Proc. 22nd Chaos Communication Congress (22C3 05), Chaos Computing Club, 2005; http://events.ccc.de/congress/2005/fahrplan/ attachments582-paper_fuzzing.pdf.
3. M.R. Lyu, Handbook of Software Reliability Engineering, IEEE CS, 1996.
4. P. Garcia-Teodoro, "Anomaly-Based Intrusion Detection: Techniques, Systems and Challenges," Computers & Security, vol. 28, nos. 1–2, 2009, pp. 18–28; http://dx.doi.org/10.1016j.cose.2008.08.003 .
5. M.R. Lyu, Encyclopedia of Software Engineering, John Wiley & Sons, 2002; doi:10.1002/0471028959.sof329.
6. D.L Buckshaw, "Mission Oriented Risk and Design Analysis of Critical Information Systems," Military Operations Research, vol. 10, no. 2, 2005.
7. J. McGibney,N. Schmidt, and A. Patel, "A Service Centric Model for Intrusion Detection in Next-Generation Networks," Computer Standards and Interfaces, vol. 27, no. 5, 2005, pp. 513–520.
20 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool