Sciweavers

677 search results - page 68 / 136
» Dempster-Shafer for Anomaly Detection
Sort
View
DIMVA
2007
13 years 9 months ago
Passive Monitoring of DNS Anomalies
We collected DNS responses at the University of Auckland Internet gateway in an SQL database, and analyzed them to detect unusual behaviour. Our DNS response data have included typ...
Bojan Zdrnja, Nevil Brownlee, Duane Wessels
ACSAC
2004
IEEE
13 years 11 months ago
A Serial Combination of Anomaly and Misuse IDSes Applied to HTTP Traffic
Combining an "anomaly" and a "misuse" IDSes offers the advantage of separating the monitored events between normal, intrusive or unqualified classes (ie not kn...
Elvis Tombini, Hervé Debar, Ludovic M&eacut...
CIKM
2007
Springer
14 years 2 months ago
Detecting distance-based outliers in streams of data
In this work a method for detecting distance-based outliers in data streams is presented. We deal with the sliding window model, where outlier queries are performed in order to de...
Fabrizio Angiulli, Fabio Fassetti
IM
2007
13 years 9 months ago
Real-time Analysis of Flow Data for Network Attack Detection
— With the wide deployment of flow monitoring in IP networks, the analysis of the exported flow data has become an important research area. It has been shown that flow data ca...
Gerhard Münz, Georg Carle
SDM
2009
SIAM
123views Data Mining» more  SDM 2009»
14 years 5 months ago
Tracking User Mobility to Detect Suspicious Behavior.
Popularity of mobile devices is accompanied by widespread security problems, such as MAC address spoofing in wireless networks. We propose a probabilistic approach to temporal an...
Gaurav Tandon, Philip K. Chan