Sciweavers

587 search results - page 19 / 118
» Anomaly Detection Using Call Stack Information
Sort
View
OSDI
2008
ACM
14 years 10 months ago
Mining Console Logs for Large-Scale System Problem Detection
The console logs generated by an application contain messages that the application developers believed would be useful in debugging or monitoring the application. Despite the ubiq...
Wei Xu, Ling Huang, Armando Fox, David A. Patterso...
IAW
2003
IEEE
14 years 3 months ago
An Evolutionary Approach to Generate Fuzzy Anomaly Signatures
Abstract— This paper describes the generation of fuzzy signatures to detect some cyber attacks. This approach is an enhancement to our previous work, which was based on the princ...
Fabio A. González, Jonatan Gómez, Ma...
CHIMIT
2009
ACM
14 years 5 months ago
Network stack diagnosis and visualization tool
End users are often frustrated by unexpected problems while using networked software, leading to frustrated calls to the help desk seeking solutions. However, trying to locate the...
Krist Wongsuphasawat, Pornpat Artornsombudh, Bao N...
IMC
2009
ACM
14 years 5 months ago
ANTIDOTE: understanding and defending against poisoning of anomaly detectors
Statistical machine learning techniques have recently garnered increased popularity as a means to improve network design and security. For intrusion detection, such methods build ...
Benjamin I. P. Rubinstein, Blaine Nelson, Ling Hua...
GLOBECOM
2008
IEEE
14 years 4 months ago
Information Theoretic Approach to Signal Feature Detection for Cognitive Radio
—Cognitive radio (CR) systems need to be able to adjust the transceiver characteristics in response to stimuli received from the radio environment. Therefore, monitoring the wire...
Mostafa Z. Afgani, Sinan Sinanovic, Harald Haas