International Journal of Advanced Research in Computer Engineering & Technology
Antagonistic network traffic is frequently "Diverse" from kind traffic in ways that can be classified without knowing the way of the attack. Anomaly exposure is a significant problem that has been investigates within diverse research areas and application domains. Many anomaly exposure techniques have been specifically residential for certain application domains, while others are more generic. These survey papers provide an ordered and complete overview of the research on anomaly exposure. The authors have grouped existing techniques into different categories based on the underlying approach adopted by each technique. For each group they have recognized key assumptions, which are used by the method to distinguish between normal and anomalous behavior.