A likelihood ratio anomaly detector for identifying within-perimeter computer network attacks
نویسندگان
چکیده
منابع مشابه
A Likelihood Ratio Detector for Identifying Within-Perimeter Computer Network Attacks
The rapid detection of attackers within firewalls of enterprise computer networks is of paramount importance. Anomaly detectors address this problem by quantifying deviations from baseline statistical models of normal network behavior and signaling an intrusion when the observed data deviates significantly from the baseline model. However, many anomaly detectors do not take into account plausib...
متن کاملAsymptotic Properties of Schweppe’s Likelihood Ratio Detector
We consider discrete-time detection with dynamical modeling, where the data generating processes are represented through state-variable techniques. Given the modeling above, one computationally effective method of calculating the likelihood ratio functions is due to Schweppe. In this paper, we study the asymptotic properties of Schweppe’s likelihood ratio detector, and evaluate the power probab...
متن کاملBuilding Computer Network Attacks
In this work we start walking the path to a new perspective for viewing cyberwarfare scenarios, by introducing conceptual tools (a formal model) to evaluate the costs of an attack, to describe the theater of operations, targets, missions, actions, plans and assets involved in cyberwarfare attacks. We also describe two applications of this model: autonomous planning leading to automated penetrat...
متن کاملExtended ratio edge detector for despeckled SAR image evaluation
Synthetic aperture radar (SAR) images due to the usage of coherent imaging systems are affected by speckle. So lots of despeckling filters have been introduced up to now to suppress the speckle. Hence, objective and subjective evaluation of the denoised SAR images becomes a necessity. Thereby lots of objective evaluating estimators are introduced to evaluate the performance of despeckling filte...
متن کاملA Taxonomy of Computer and Network Attacks
A Taxonomy of Computer and Network Attacks This chapter presents a brief discussion of the desired characteristics of a taxonomy. This is followed by a critique of current taxonomies in the computer and network security field. These current taxonomies include lists of terms, lists of categories, results categories, empirical lists and matrices. A proposed taxonomy for computer and network attac...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Journal of Network and Computer Applications
سال: 2016
ISSN: 1084-8045
DOI: 10.1016/j.jnca.2016.03.008