DocumentCode
43188
Title
An Overview of Anomaly Detection
Author
Sample, C. ; Schaffer, K.
Volume
15
Issue
1
fYear
2013
fDate
Jan.-Feb. 2013
Firstpage
8
Lastpage
11
Abstract
Security automation continues to depend on signature models, but vulnerability exploitation is exceeding the abilities of such models. The authors, in reviewing the different types of mathematical-based constructs in anomaly detection, reveal how anomaly detection can enhance network security by potentially solving problems that signature models can´t address.
Keywords
computer network security; digital signatures; anomaly detection; mathematical-based constructs; network security; security automation; signature models; vulnerability exploitation; Analytical models; Bayesian methods; Data models; Humans; Markov processes; Mathematical model; Security; anomaly detection; information technology; network security;
fLanguage
English
Journal_Title
IT Professional
Publisher
ieee
ISSN
1520-9202
Type
jour
DOI
10.1109/MITP.2013.7
Filename
6449388
Link To Document