Title :
An Overview of Anomaly Detection
Author :
Sample, C. ; Schaffer, K.
Abstract :
Security automation continues to depend on signature models, but vulnerability exploitation is exceeding the abilities of such models. The authors, in reviewing the different types of mathematical-based constructs in anomaly detection, reveal how anomaly detection can enhance network security by potentially solving problems that signature models can´t address.
Keywords :
computer network security; digital signatures; anomaly detection; mathematical-based constructs; network security; security automation; signature models; vulnerability exploitation; Analytical models; Bayesian methods; Data models; Humans; Markov processes; Mathematical model; Security; anomaly detection; information technology; network security;
Journal_Title :
IT Professional
DOI :
10.1109/MITP.2013.7