Outlier detection method use for the network flow anomaly detection / Išskirčių radimo metodų taikymas anomalijoms kompiuterių tinklo paketų srautuose aptikti
New and existing methods of cyber-attack detection are constantly being developed and improved because there is a great number of attacks and the demand to protect from them. In prac-tice, current methods of attack detection operates like antivirus programs, i. e. known attacks signatures are creat...
Main Authors: | , |
---|---|
Format: | Article |
Language: | English |
Published: |
Vilnius Gediminas Technical University
2016-06-01
|
Series: | Mokslas: Lietuvos Ateitis |
Subjects: | |
Online Access: | http://journals.vgtu.lt/index.php/MLA/article/view/2453 |