Sciweavers

309 search results - page 6 / 62
» Network Performance Anomaly Detection and Localization
Sort
View
IMC
2010
ACM
15 years 10 days ago
Temporally oblivious anomaly detection on large networks using functional peers
Previous methods of network anomaly detection have focused on defining a temporal model of what is "normal," and flagging the "abnormal" activity that does not...
Kevin M. Carter, Richard Lippmann, Stephen W. Boye...
92
Voted
CCS
2003
ACM
15 years 7 months ago
Anomaly detection of web-based attacks
Web-based vulnerabilities represent a substantial portion of the security exposures of computer networks. In order to detect known web-based attacks, misuse detection systems are ...
Christopher Krügel, Giovanni Vigna
NOMS
2008
IEEE
141views Communications» more  NOMS 2008»
15 years 8 months ago
Detecting BGP anomalies with wavelet
—In this paper, we propose a BGP anomaly detection framework called BAlet that delivers both temporal and spatial localization of the potential anomalies. It requires only a simp...
Jianning Mai, Lihua Yuan, Chen-Nee Chuah
CANS
2005
Springer
134views Cryptology» more  CANS 2005»
15 years 8 months ago
A New Unsupervised Anomaly Detection Framework for Detecting Network Attacks in Real-Time
Abstract. In this paper, we propose a new unsupervised anomaly detection framework for detecting network intrusions online. The framework consists of new anomalousness metrics name...
Wei Lu, Issa Traoré
120
Voted
IJNSEC
2007
125views more  IJNSEC 2007»
15 years 2 months ago
An Observation-Centric Analysis on the Modeling of Anomaly-based Intrusion Detection
It is generally agreed that two key points always attract special concerns during the modelling of anomaly-based intrusion detection. One is the techniques about discerning two cl...
Zonghua Zhang, Hong Shen, Yingpeng Sang