Sciweavers

159 search results - page 11 / 32
» Anomaly Detection in P2P Networks Using Markov Modelling
Sort
View
ATAL
2008
Springer
13 years 10 months ago
CAMNEP: agent-based network intrusion detection system
We present a prototype of agent-based intrusion detection system designed for deployment on high-speed backbone networks. The main contribution of the system is the integration of...
Martin Rehák, Michal Pechoucek, Pavel Celed...
ACSAC
2004
IEEE
14 years 11 days ago
RACOON: Rapidly Generating User Command Data For Anomaly Detection From Customizable Templates
One of the biggest obstacles faced by user command based anomaly detection techniques is the paucity of data. Gathering command data is a slow process often spanning months or yea...
Ramkumar Chinchani, Aarthie Muthukrishnan, Madhusu...
ICMLA
2007
13 years 10 months ago
Soft Failure Detection Using Factorial Hidden Markov Models
In modern business, educational, and other settings, it is common to provide a digital network that interconnects hardware devices for shared access by the users (e.g., in an ofï¬...
Guillaume Bouchard, Jean-Marc Andreoli
PERCOM
2009
ACM
14 years 3 months ago
Markov Chain Existence and Hidden Markov Models in Spectrum Sensing
—The primary function of a cognitive radio is to detect idle frequencies or sub-bands, not used by the primary users (PUs), and allocate these frequencies to secondary users. The...
Chittabrata Ghosh, Carlos de M. Cordeiro, Dharma P...
RAID
2009
Springer
14 years 3 months ago
Adaptive Anomaly Detection via Self-calibration and Dynamic Updating
The deployment and use of Anomaly Detection (AD) sensors often requires the intervention of a human expert to manually calibrate and optimize their performance. Depending on the si...
Gabriela F. Cretu-Ciocarlie, Angelos Stavrou, Mich...