Detecting Temporal and Spatial Anomalies in Users’ Activities for Security Provisioning in Computer Networks
DOI:
https://doi.org/10.31449/inf.v47i2.4933Abstract
The paper summarizes a Doctoral Thesis that focuses on two new approaches for detecting anomalies in computer networks based on network flows. The approaches use incremental hierarchical clustering algorithms and monitor changes in the data structures to detect anomalies. Both approaches achieved prediction performance comparable to the state-of-the-art supervised approaches (F1 score over 0.90), even when taking into account that our approaches see every data point only once and then discard it and they operate without the prerequisite learning phase with labeled data.References
Kizza, J. M. (2020), Guide to computer network security, Springer.
Thakkar, A. and Lohiya, R. (2021), A survey on intrusion detection system: feature selection, model, performance measures, application perspective, challenges, and future research directions, Artificial Intelligence Review, Springer, pp. 1--111.
Huč, A. (2022), Detecting temporal and spatial anomalies in users' activities for security provisioning in computer networks, doktorska disertacija, Ljubljana, https://repozitorij.uni-lj.si/IzpisGradiva.php?id=137562.
Sharafaldin, I. and Lashkari, A. H. and Ghorbani, A. A. (2018), Toward Generating a New Intrusion Detection Dataset and Intrusion Traffic Characterizationy, 4th International Conference on Information Systems Security and Privacy (ICISSP), pp. 108--116.
Huč, A. and Trček, D. (2021), Anomaly detection in IoT networks: From architectures to machine learning transparency, IEEE Access, IEEE, pp. 60607--60616.
Downloads
Published
How to Cite
Issue
Section
License
I assign to Informatica, An International Journal of Computing and Informatics ("Journal") the copyright in the manuscript identified above and any additional material (figures, tables, illustrations, software or other information intended for publication) submitted as part of or as a supplement to the manuscript ("Paper") in all forms and media throughout the world, in all languages, for the full term of copyright, effective when and if the article is accepted for publication. This transfer includes the right to reproduce and/or to distribute the Paper to other journals or digital libraries in electronic and online forms and systems.
I understand that I retain the rights to use the pre-prints, off-prints, accepted manuscript and published journal Paper for personal use, scholarly purposes and internal institutional use.
In certain cases, I can ask for retaining the publishing rights of the Paper. The Journal can permit or deny the request for publishing rights, to which I fully agree.
I declare that the submitted Paper is original, has been written by the stated authors and has not been published elsewhere nor is currently being considered for publication by any other journal and will not be submitted for such review while under review by this Journal. The Paper contains no material that violates proprietary rights of any other person or entity. I have obtained written permission from copyright owners for any excerpts from copyrighted works that are included and have credited the sources in my article. I have informed the co-author(s) of the terms of this publishing agreement.
Copyright © Slovenian Society Informatika