Preliminary Content
Acknowledgements
Abstract
1
Introduction
1.1
Anomaly Detection
1.2
Network Attacks
1.2.1
Status Quo Solution
2
Networks Dataset
2.1
Features
2.2
Argus and Data Nuances
3
Preliminary Data Investigation
3.1
Exploratory Data Analysis
3.1.1
Cleaning Predictors
3.1.2
Categorical Features: Unique Categories and Counts
3.1.3
Continuous Features: Distributions and Relationships
3.1.4
Correlation Between Features
3.2
Transformations on the Data
3.2.1
Removing Quantiles
3.2.2
Log Transformation
3.2.3
Normal Scores Transformation
4
Matrix Techniques for Anomaly Detection
4.1
Ports Combination Matrix/Tensor
4.2
Principal Component Analysis
4.2.1
Investigating Combinations
4.3
Matrix Completion via Singular Value Decomposition
5
Statistical Model
5.1
Uneven Variances
5.2
Determined Model
5.3
Conclusion
Appendix
A
The First Appendix
B
The Second Appendix, for Fun
References
Published with bookdown
Matrix Based Anomaly Detection Techniques Applied to Network Attacks
Chapter 5
Statistical Model
5.1
Uneven Variances
Discuss AMMI model
5.2
Determined Model
5.3
–>
–>
–>
–>