Outlier detection method use for the network flow anomaly detection / Išskirčių radimo metodų taikymas anomalijoms kompiuterių tinklo paketų srautuose aptikti

New and existing methods of cyber-attack detection are constantly being developed and improved because there is a great number of attacks and the demand to protect from them. In prac-tice, current methods of attack detection operates like antivirus programs, i. e. known attacks signatures are creat...

Full description

Bibliographic Details
Main Authors: Rimas Ciplinskas, Nerijus Paulauskas
Format: Article
Language:English
Published: Vilnius Gediminas Technical University 2016-06-01
Series:Mokslas: Lietuvos Ateitis
Subjects:
LOF
Online Access:http://journals.vgtu.lt/index.php/MLA/article/view/2453