Anomaly Detection
- Employ supervised algorithms, whose performances highly depend on attack-free training data.
- Unsupervised anomaly detection techniques, however, the system can be trained with unlabeled data and is capable of detecting previously unseen attacks.
- Categorized the existing ANIDSs based on its type, class, nature of detection/ processing, level of security, etc. We also enlist some proximity measures for intrusion data analysis and detection.
- The intrusion detection is one of the important components of infrastructure protection mechanism.