• DocumentCode
    43188
  • Title

    An Overview of Anomaly Detection

  • Author

    Sample, C. ; Schaffer, K.

  • Volume
    15
  • Issue
    1
  • fYear
    2013
  • fDate
    Jan.-Feb. 2013
  • Firstpage
    8
  • Lastpage
    11
  • Abstract
    Security automation continues to depend on signature models, but vulnerability exploitation is exceeding the abilities of such models. The authors, in reviewing the different types of mathematical-based constructs in anomaly detection, reveal how anomaly detection can enhance network security by potentially solving problems that signature models can´t address.
  • Keywords
    computer network security; digital signatures; anomaly detection; mathematical-based constructs; network security; security automation; signature models; vulnerability exploitation; Analytical models; Bayesian methods; Data models; Humans; Markov processes; Mathematical model; Security; anomaly detection; information technology; network security;
  • fLanguage
    English
  • Journal_Title
    IT Professional
  • Publisher
    ieee
  • ISSN
    1520-9202
  • Type

    jour

  • DOI
    10.1109/MITP.2013.7
  • Filename
    6449388