Sciweavers

912 search results - page 38 / 183
» Anomaly
Sort
View
SIGMETRICS
2010
ACM
173views Hardware» more  SIGMETRICS 2010»
13 years 9 months ago
Detecting traffic anomalies using an equilibrium property
When many flows are multiplexed on a non-saturated link, their volume changes over short timescales tend to cancel each other out, making the average change across flows close to ...
Fernando Silveira, Christophe Diot, Nina Taft, Ram...
CORR
2010
Springer
139views Education» more  CORR 2010»
13 years 8 months ago
Information Fusion for Anomaly Detection with the Dendritic Cell Algorithm
Dendritic cells are antigen presenting cells that provide a vital link between the innate and adaptive immune system, providing the initial detection of pathogenic invaders. Resea...
Julie Greensmith, Uwe Aickelin, Gianni Tedesco
COMCOM
2006
121views more  COMCOM 2006»
13 years 8 months ago
Application of anomaly detection algorithms for detecting SYN flooding attacks
Abstract-- We investigate statistical anomaly detection algorithms for detecting SYN flooding, which is the most common type of Denial of Service (DoS) attack. The two algorithms c...
Vasilios A. Siris, Fotini Papagalou
KDD
2004
ACM
124views Data Mining» more  KDD 2004»
14 years 9 months ago
Eigenspace-based anomaly detection in computer systems
We report on an automated runtime anomaly detection method at the application layer of multi-node computer systems. Although several network management systems are available in th...
Hisashi Kashima, Tsuyoshi Idé
ADAEUROPE
2006
Springer
14 years 2 months ago
Static Detection of Access Anomalies in Ada95
In this paper we present data flow frameworks that are able to detect access anomalies in Ada multi-tasking programs. In particular, our approach finds all possible non-sequentia...
Bernd Burgstaller, Johann Blieberger, Robert Mitte...