Sciweavers

92 search results - page 8 / 19
» Link-Based Anomaly Detection in Communication Networks
Sort
View
ICC
2007
IEEE
128views Communications» more  ICC 2007»
13 years 7 months ago
The Power of Temporal Pattern Processing in Anomaly Intrusion Detection
Abstract— A clear deficiency in most of todays Anomaly Intrusion Detection Systems (AIDS) is their inability to distinguish between a new form of legitimate normal behavior and ...
Mohammad Al-Subaie, Mohammad Zulkernine
MINENET
2005
ACM
14 years 1 months ago
Learning-based anomaly detection in BGP updates
Detecting anomalous BGP-route advertisements is crucial for improving the security and robustness of the Internet’s interdomain-routing system. In this paper, we propose an inst...
Jian Zhang, Jennifer Rexford, Joan Feigenbaum
ICCCN
2007
IEEE
14 years 1 months ago
Fates: A Granular Approach to Real-Time Anomaly Detection
— Anomaly-based intrusion detection systems have the ability of detecting novel attacks, but in real-time detection, they face the challenges of producing many false alarms and f...
Jeff Janies, Chin-Tser Huang
MOBISYS
2008
ACM
14 years 7 months ago
Detecting energy-greedy anomalies and mobile malware variants
Mobile users of computation and communication services have been rapidly adopting battery-powered mobile handhelds, such as PocketPCs and SmartPhones, for their work. However, the...
Hahnsang Kim, Joshua Smith, Kang G. Shin
CCR
2008
86views more  CCR 2008»
13 years 7 months ago
The need for simulation in evaluating anomaly detectors
Anomalous events that affect the performance of networks are a fact of life. It is therefore not surprising that recent years have seen an explosion in research on network anomaly...
Haakon Ringberg, Matthew Roughan, Jennifer Rexford