Sciweavers

172 search results - page 9 / 35
» Anomaly detection of web-based attacks
Sort
View
ICANNGA
2009
Springer
201views Algorithms» more  ICANNGA 2009»
14 years 2 months ago
A Novel Signal-Based Approach to Anomaly Detection in IDS Systems
In this paper we present our original methodology, in which Matching Pursuit is used for networks anomaly and intrusion detection. The architecture of anomaly-based IDS based on si...
Lukasz Saganowski, Michal Choras, Rafal Renk, Wito...
ICDCS
2003
IEEE
14 years 25 days ago
Cross-Feature Analysis for Detecting Ad-Hoc Routing Anomalies
With the proliferation of wireless devices, mobile ad hoc networking (MANET) has become a very exciting and important technology due to its characteristics of open medium and dyna...
Yi-an Huang, Wei Fan, Wenke Lee, Philip S. Yu
IM
2007
13 years 9 months ago
Real-time Analysis of Flow Data for Network Attack Detection
— With the wide deployment of flow monitoring in IP networks, the analysis of the exported flow data has become an important research area. It has been shown that flow data ca...
Gerhard Münz, Georg Carle
NOMS
2008
IEEE
141views Communications» more  NOMS 2008»
14 years 1 months ago
Detecting BGP anomalies with wavelet
—In this paper, we propose a BGP anomaly detection framework called BAlet that delivers both temporal and spatial localization of the potential anomalies. It requires only a simp...
Jianning Mai, Lihua Yuan, Chen-Nee Chuah
INFOCOM
2007
IEEE
14 years 1 months ago
Multivariate Online Anomaly Detection Using Kernel Recursive Least Squares
— High-speed backbones are regularly affected by various kinds of network anomalies, ranging from malicious attacks to harmless large data transfers. Different types of anomalies...
Tarem Ahmed, Mark Coates, Anukool Lakhina