Sciweavers

677 search results - page 67 / 136
» Dempster-Shafer for Anomaly Detection
Sort
View
ICC
2007
IEEE
14 years 2 months ago
Using Session-Keystroke Mutual Information to Detect Self-Propagating Malicious Codes
— In this paper, we propose an endpoint-based joint network-host anomaly detection technique to detect selfpropagating malicious codes. Our proposed technique is based on the obs...
Syed A. Khayam, Hayder Radha
CCS
2009
ACM
14 years 2 months ago
Keep your friends close: the necessity for updating an anomaly sensor with legitimate environment changes
Large-scale distributed systems have dense, complex code-bases that are assumed to perform multiple and inter-dependent tasks while user interaction is present. The way users inte...
Angelos Stavrou, Gabriela F. Cretu-Ciocarlie, Mich...
CLUSTER
2007
IEEE
14 years 2 months ago
Anomaly localization in large-scale clusters
— A critical problem facing by managing large-scale clusters is to identify the location of problems in a system in case of unusual events. As the scale of high performance compu...
Ziming Zheng, Yawei Li, Zhiling Lan
ICDCS
2007
IEEE
13 years 11 months ago
Communication-Efficient Tracking of Distributed Cumulative Triggers
In recent work, we proposed D-Trigger, a framework for tracking a global condition over a large network that allows us to detect anomalies while only collecting a very limited amo...
Ling Huang, Minos N. Garofalakis, Anthony D. Josep...
CSREASAM
2007
13 years 9 months ago
Intrusion Detection System to Detect Wormhole Using Fault Localization Techniques
— In this paper, we present a strategy to detect an intrusion using fault localization tools. We propose an intrusion detection system to detect a self-contained in-band wormhole...
Maitreya Natu, Adarshpal S. Sethi