DocumentCode :
43188
Title :
An Overview of Anomaly Detection
Author :
Sample, C. ; Schaffer, K.
Volume :
15
Issue :
1
fYear :
2013
fDate :
Jan.-Feb. 2013
Firstpage :
8
Lastpage :
11
Abstract :
Security automation continues to depend on signature models, but vulnerability exploitation is exceeding the abilities of such models. The authors, in reviewing the different types of mathematical-based constructs in anomaly detection, reveal how anomaly detection can enhance network security by potentially solving problems that signature models can´t address.
Keywords :
computer network security; digital signatures; anomaly detection; mathematical-based constructs; network security; security automation; signature models; vulnerability exploitation; Analytical models; Bayesian methods; Data models; Humans; Markov processes; Mathematical model; Security; anomaly detection; information technology; network security;
fLanguage :
English
Journal_Title :
IT Professional
Publisher :
ieee
ISSN :
1520-9202
Type :
jour
DOI :
10.1109/MITP.2013.7
Filename :
6449388
Link To Document :
بازگشت