Sciweavers

323 search results - page 13 / 65
» Alert Detection in System Logs
Sort
View
GRID
2007
Springer
14 years 2 months ago
Log summarization and anomaly detection for troubleshooting distributed systems
— Today’s system monitoring tools are capable of detecting system failures such as host failures, OS errors, and network partitions in near-real time. Unfortunately, the same c...
Dan Gunter, Brian Tierney, Aaron Brown, D. Martin ...
MOBISYS
2007
ACM
14 years 8 months ago
Algorithm to automatically detect abnormally long periods of inactivity in a home
An algorithm has been developed to automatically construct individual models of normal activity within a home using motion sensor data. Alerts can be generated when a period of in...
Paul Cuddihy, Jenny Weisenberg, Catherine Graichen...
VLDB
2004
ACM
105views Database» more  VLDB 2004»
14 years 1 months ago
Tamper Detection in Audit Logs
Audit logs are considered good practice for business systems, and are required by federal regulations for secure systems, drug approval data, medical information disclosure, fina...
Richard T. Snodgrass, Shilong (Stanley) Yao, Chris...
GLOBECOM
2008
IEEE
13 years 8 months ago
Highly Memory-Efficient LogLog Hash for Deep Packet Inspection
As the network line rates reach 40 Gbps today and 100 Gbps in the near future, performing deep packet inspection (DPI) in the Network Intrusion Detection and Prevention Systems (NI...
Masanori Bando, N. Sertac Artan, H. Jonathan Chao
INCDM
2010
Springer
159views Data Mining» more  INCDM 2010»
14 years 1 months ago
Semi-supervised Learning for False Alarm Reduction
Abstract. Intrusion Detection Systems (IDSs) which have been deployed in computer networks to detect a wide variety of attacks are suffering how to manage of a large number of tri...
Chien-Yi Chiu, Yuh-Jye Lee, Chien-Chung Chang, Wen...