Sciweavers

587 search results - page 34 / 118
» Anomaly Detection Using Call Stack Information
Sort
View
DISCEX
2003
IEEE
14 years 3 months ago
Statistical Approaches to DDoS Attack Detection and Response
The nature of the threats posed by Distributed Denial of Service (DDoS) attacks on large networks, such as the Internet, demands effective detection and response methods. These me...
Laura Feinstein, Dan Schnackenberg, Ravindra Balup...
INFOCOM
2006
IEEE
14 years 4 months ago
Analyzing the Receiver Window Modification Scheme of TCP Queues
– Explicit Congestion Notification (ECN) and Active Queue Management (AQM) Schemes such as Random Early Detection (RED), Adaptive Random Early Detection (ARED) and BLUE queues ha...
Visvasuresh Victor Govindaswamy, Gergely V. Z&aacu...
ICC
2007
IEEE
109views Communications» more  ICC 2007»
14 years 4 months ago
Real Time Detection of Link Failures in Inter Domain Routing
Abstract— Measurements have shown that network path failures occur frequently in the Internet and physical link failures can cause network instability in large scale and severity...
Xiaobo Long, Biplab Sikdar
RAID
2000
Springer
14 years 1 months ago
Adaptive, Model-Based Monitoring for Cyber Attack Detection
Inference methods for detecting attacks on information resources typically use signature analysis or statistical anomaly detection methods. The former have the advantage of attack...
Alfonso Valdes, Keith Skinner
CVPR
2005
IEEE
15 years 11 days ago
Detection and Explanation of Anomalous Activities: Representing Activities as Bags of Event n-Grams
We present a novel representation and method for detecting and explaining anomalous activities in a video stream. Drawing from natural language processing, we introduce a represen...
Raffay Hamid, Amos Y. Johnson, Samir Batta, Aaron ...