The Community for Technology Leaders
Green Image
Issue No. 01 - Jan.-Feb. (2013 vol. 15)
ISSN: 1520-9202
pp: 8-11
Char Sample , Capitol College
Kim Schaffer , Capitol College
ABSTRACT
Security automation continues to depend on signature models, but vulnerability exploitation is exceeding the abilities of such models. The authors, in reviewing the different types of mathematical-based constructs in anomaly detection, reveal how anomaly detection can enhance network security by potentially solving problems that signature models can't address.
INDEX TERMS
information technology, network security, anomaly detection
CITATION
Char Sample, Kim Schaffer, "An Overview of Anomaly Detection", IT Professional, vol. 15, no. , pp. 8-11, Jan.-Feb. 2013, doi:10.1109/MITP.2013.7
99 ms
(Ver 3.3 (11022016))