main webpage
W Topic
Anomaly Detection
Procedia Computer Science • Vol 220
Modified Flower Pollination Algorithm for ICMPv6-Based DDoS Attacks Anomaly Detection
2023
Internet Protocol version 6 (IPv6) is the latest version of IP that goal to host 3.4*1038 unique IP addresses of devices in the network. IPv6 needed a number of protocols such as the Address Auto-configuration scheme and Internet Control Message Protocol (ICM…
Article

Anomaly Detection

Approach in data analysis

In data analysis, anomaly detection (also referred to as outlier detection and sometimes as novelty detection) is generally understood to be the identification of rare items, events or observations which deviate significantly from the majority of the data and do not conform to a well defined notion of normal behavior. Such examples may arouse suspicions of being generated by a different mechanism, or appear inconsistent with the remainder of that set of data.

Anomaly detection finds application in many domains including cybersecurity, medicine, machine vision, statistics, neuroscience, law enforcement and financial fraud to name only a few.

Exploring foci of:
Procedia Computer Science • Vol 220
Modified Flower Pollination Algorithm for ICMPv6-Based DDoS Attacks Anomaly Detection
2023
Internet Protocol version 6 (IPv6) is the latest version of IP that goal to host 3.4*1038 unique IP addresses of devices in the network. IPv6 needed a number of protocols such as the Address Auto-configuration scheme and Internet Control Message Protocol (ICMPv6), IPv6 is vulnerable to numerous attacks such as Denial of Service (DoS) and Distributed Denial of Service (DDoS), DDoS is one of the most dangerous attacks carried out through ICMPv6 messages that impose security and pecuniary implications. Therefore, an …
Click Anomaly Detection Vs:
Computer Science
Computer Security
Algorithm
Internet
Data Mining
Alternative Medicine
Medicine
Histopathology