Sciweavers

765 search results - page 18 / 153
» Detecting Anomalies and Intruders
Sort
View
NDSS
2006
IEEE
14 years 3 months ago
Using Generalization and Characterization Techniques in the Anomaly-based Detection of Web Attacks
The custom, ad hoc nature of web applications makes learning-based anomaly detection systems a suitable approach to provide early warning about the exploitation of novel vulnerabi...
William K. Robertson, Giovanni Vigna, Christopher ...
IPPS
2005
IEEE
14 years 3 months ago
Some Issues in Solving the Anomaly Detection Problem using Immunological Approach
Results of an experimental study of an anomaly detection system based on the paradigm of artificial immune systems (AISs) are presented. Network traffic data are mapped into ant...
Franciszek Seredynski, Pascal Bouvry
ICPPW
2008
IEEE
14 years 4 months ago
Disparity: Scalable Anomaly Detection for Clusters
In this paper, we describe disparity, a tool that does parallel, scalable anomaly detection for clusters. Disparity uses basic statistical methods and scalable reduction operation...
Narayan Desai, Rick Bradshaw, Ewing L. Lusk
ADMA
2006
Springer
112views Data Mining» more  ADMA 2006»
14 years 3 months ago
Finding Time Series Discords Based on Haar Transform
The problem of finding anomaly has received much attention recently. However, most of the anomaly detection algorithms depend on an explicit definition of anomaly, which may be i...
Ada Wai-Chee Fu, Oscar Tat-Wing Leung, Eamonn J. K...
ICASSP
2011
IEEE
13 years 1 months ago
A new criterion for optimal constrained minimax detection and classification
This paper adresses the problem of anomaly detection and classification by using a noisy measurement vector corrupted by some linear unknown nuisance parameters. An invariant con...
Lionel Fillatre, Igor Nikiforov