Sciweavers

21 search results - page 3 / 5
» Baseline Profile Stability for Network Anomaly Detection
Sort
View
CORR
2010
Springer
92views Education» more  CORR 2010»
13 years 6 months ago
Network Intrusion Detection Using FP Tree Rules
----------------------------------------------ABSTRACT-------------------------------------------In the faceless world of the Internet, online fraud is one of the greatest reasons ...
P. Srinivasulu, J. Ranga Rao, I. Ramesh Babu
ICPR
2008
IEEE
14 years 8 months ago
Wire detection in low-altitude, urban, and low-quality video frames
We introduce a novel wire detection algorithm for use in low altitude urban aircraft reconnaissance. A line profile model is described and effectively used to discriminate wires f...
Dmitry B. Goldgof, Joshua Candamo
RAID
2004
Springer
14 years 24 days ago
Anomalous Payload-Based Network Intrusion Detection
We present a payload-based anomaly detector, we call PAYL, for intrusion detection. PAYL models the normal application payload of network traffic in a fully automatic, unsupervised...
Ke Wang, Salvatore J. Stolfo
JSAC
2006
95views more  JSAC 2006»
13 years 7 months ago
Impact of Packet Sampling on Portscan Detection
Abstract-- Packet sampling is commonly deployed in highspeed backbone routers to minimize resources used for network monitoring. It is known that packet sampling distorts traffic s...
Jianning Mai, Ashwin Sridharan, Chen-Nee Chuah, Hu...
NETWORKING
2004
13 years 8 months ago
On Detection of Anomalous Routing Dynamics in BGP
BGP, the de facto inter-domain routing protocol, is the core component of current Internet infrastructure. BGP traffic deserves thorough exploration, since abnormal BGP routing dy...
Ke Zhang, Amy Yen, Xiaoliang Zhao, Daniel Massey, ...