J4 ›› 2009, Vol. 47 ›› Issue (6): 1264-1270.

Previous Articles     Next Articles

Techniques of IDS Based on Anomaly Detection

HU Liang1, JIN Gang1, YU Man2, REN Fei1, REN Weiwu1   

  1. 1. College of Computer Science and Technology, Jilin University, Changchun 130012, China;2. College of Computer Science and Technology, Changchun University of Technology, Changchun 130012, China
  • Received:2008-12-06 Online:2009-11-26 Published:2010-01-07
  • Contact: JIN Gang E-mail:jingang_jlu@126.com

Abstract:

The authors provided a comprehensive survey of anomaly detection systems used in the recent years. Intrusion detection was divided into 3 kinds based on technologies used. They are statistical anomaly detection, machine learning based anomaly detection and data mining based anomaly detection. The authors described the various features of anomaly detection technologies in details, represented the algorithms used in the current Anomaly Intrusion Detection Systems, the implements of the algorithms, and also compared the effects of various detection algorithms through the experiment.

Key words: anomaly detection, machine learning, statistical anomaly detection, data mining

CLC Number: 

  • TP393