Abstract
In this paper some preliminary results of network anomaly detection for resource-constrained systems have been presented. All described algorithms are embedded into a three-tier system application. The presented solution is a response to nowadays trends in computer/network security domain that indicate gradual shifting from signature-based anomaly detection typically based on some selected statistical measures toward systems that are based on behavioural analysis of computer systems and/or networks. The presented system requirements, explain relevant terminology as well as we include some selected results and their analysis. The solution is potentially destined for very resource-constrained systems (IoT specifically), all tests were carried out in an example network to additionally analyse their effect of the presented approach on the computer resources.
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.