Reference Hub4
Anomaly-Based Intrusion Detection: Adapting to Present and Forthcoming Communication Environments

Anomaly-Based Intrusion Detection: Adapting to Present and Forthcoming Communication Environments

Jorge Maestre Vidal, Marco Antonio Sotelo Monge, Sergio Mauricio Martínez Monterrubio
ISBN13: 9781522596110|ISBN10: 1522596119|ISBN13 Softcover: 9781522596127|EISBN13: 9781522596134
DOI: 10.4018/978-1-5225-9611-0.ch010
Cite Chapter Cite Chapter

MLA

Vidal, Jorge Maestre, et al. "Anomaly-Based Intrusion Detection: Adapting to Present and Forthcoming Communication Environments." Handbook of Research on Machine and Deep Learning Applications for Cyber Security, edited by Padmavathi Ganapathi and D. Shanmugapriya, IGI Global, 2020, pp. 195-218. https://doi.org/10.4018/978-1-5225-9611-0.ch010

APA

Vidal, J. M., Monge, M. A., & Monterrubio, S. M. (2020). Anomaly-Based Intrusion Detection: Adapting to Present and Forthcoming Communication Environments. In P. Ganapathi & D. Shanmugapriya (Eds.), Handbook of Research on Machine and Deep Learning Applications for Cyber Security (pp. 195-218). IGI Global. https://doi.org/10.4018/978-1-5225-9611-0.ch010

Chicago

Vidal, Jorge Maestre, Marco Antonio Sotelo Monge, and Sergio Mauricio Martínez Monterrubio. "Anomaly-Based Intrusion Detection: Adapting to Present and Forthcoming Communication Environments." In Handbook of Research on Machine and Deep Learning Applications for Cyber Security, edited by Padmavathi Ganapathi and D. Shanmugapriya, 195-218. Hershey, PA: IGI Global, 2020. https://doi.org/10.4018/978-1-5225-9611-0.ch010

Export Reference

Mendeley
Favorite

Abstract

Anomaly-based intrusion detection has become an indispensable player on the existing cybersecurity landscape, where it enables the identification of suspicious behaviors that significantly differ from normal activities. In this way, it is possible to discover never-seen-before threats and provide zero-day recognition capabilities. But the recent advances on communication technologies are leading to changes in the monitoring scenarios that result in novel challenges to be taken into consideration, as is the case of greater data heterogeneity, adversarial attacks, energy consumption, or lack of up-to-date datasets. With the aim on bringing the reader closer to them, this chapter deepens the following topics: evolution of the anomaly definition, anomaly recognition for network-based intrusion detection, outlier characterizations, knowledge acquisition for usage modelling, distances and similarity measures for decision-making, anomaly recognition and non-stationarity, metrics and evaluation methodologies, and challenges related with the emergent monitorization environments.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.