Sciweavers

115 search results - page 12 / 23
» An Effective Anomaly Detection Method in SMTP Traffic
Sort
View
SP
2003
IEEE
107views Security Privacy» more  SP 2003»
14 years 26 days ago
Anomaly Detection Using Call Stack Information
The call stack of a program execution can be a very good information source for intrusion detection. There is no prior work on dynamically extracting information from call stack a...
Henry Hanping Feng, Oleg M. Kolesnikov, Prahlad Fo...
ICPR
2010
IEEE
13 years 5 months ago
Online Learning with Self-Organizing Maps for Anomaly Detection in Crowd Scenes
Detecting abnormal behaviors in crowd scenes is quite important for public security and has been paid more and more attentions. Most previous methods use offline trained model to p...
Jie Feng, Chao Zhang, Pengwei Hao
INFOCOM
2010
IEEE
13 years 6 months ago
A Signal Processing View on Packet Sampling and Anomaly Detection
—Anomaly detection methods typically operate on pre-processed, i.e., sampled and aggregated, traffic traces. Most traffic capturing devices today employ random packet sampling,...
Daniela Brauckhoff, Kavé Salamatian, Martin...
INFOCOM
2009
IEEE
14 years 2 months ago
ALDO: An Anomaly Detection Framework for Dynamic Spectrum Access Networks
—Dynamic spectrum access has been proposed as a means to share scarce radio resources, and requires devices to follow protocols that use resources in a proper, disciplined manner...
Song Liu, Yingying Chen, Wade Trappe, Larry J. Gre...
ITIIS
2010
172views more  ITIIS 2010»
13 years 6 months ago
Combining Adaptive Filtering and IF Flows to Detect DDoS Attacks within a Router
Traffic matrix-based anomaly detection and DDoS attacks detection in networks are research focus in the network security and traffic measurement community. In this paper, firstly,...
Ruoyu Yan, Qinghua Zheng, Haifei Li