Network attacks are on the rise, and a lot of research work has been done to thwart the negative effects from such attacks. As discussed in the previous chapters, we identify attacks as any unauthorized attempt to do the following:
- Get hold of information
- Modify information
- Disrupt services
- Perform distributed denial of service to and from the server where information is stored
- Exploit using malware and viruses
- Privilege escalation and credential compromise
Network anomalies are unlike regular network infections by viruses. In such cases, network anomalies are detected by identifying non-conforming patterns in the network data. Not just network intrusion detection, such methods can also be used for other forms of outlier detection such as credit fraud, traffic violation detection, and customer churn detection.
This chapter will...