Sciweavers

912 search results - page 51 / 183
» Anomaly
Sort
View
INFOCOM
2007
IEEE
14 years 3 months ago
Diagnosing Link-Level Anomalies Using Passive Probes
Abstract—In this paper, we develop passive network tomography techniques for inferring link-level anomalies like excessive loss rates and delay from path-level measurements. Our ...
Shipra Agrawal, K. V. M. Naidu, Rajeev Rastogi
ICCBR
2007
Springer
14 years 3 months ago
From Anomaly Reports to Cases
Abstract. Creating case representations in unsupervised textual case-based reasoning applications is a challenging task because class knowledge is not available to aid selection of...
Stewart Massie, Nirmalie Wiratunga, Susan Craw, Al...
CANS
2005
Springer
134views Cryptology» more  CANS 2005»
14 years 2 months ago
A New Unsupervised Anomaly Detection Framework for Detecting Network Attacks in Real-Time
Abstract. In this paper, we propose a new unsupervised anomaly detection framework for detecting network intrusions online. The framework consists of new anomalousness metrics name...
Wei Lu, Issa Traoré
SP
2003
IEEE
107views Security Privacy» more  SP 2003»
14 years 2 months ago
Anomaly Detection Using Call Stack Information
The call stack of a program execution can be a very good information source for intrusion detection. There is no prior work on dynamically extracting information from call stack a...
Henry Hanping Feng, Oleg M. Kolesnikov, Prahlad Fo...
WWIC
2010
Springer
193views Communications» more  WWIC 2010»
14 years 22 days ago
0day Anomaly Detection Made Possible Thanks to Machine Learning
Abstract. This paper proposes new cognitive algorithms and mechanisms for detecting 0day attacks targeting the Internet and its communication performances and behavior. For this pu...
Philippe Owezarski, Johan Mazel, Yann Labit