Sciweavers

799 search results - page 30 / 160
» Network anomaly detection based on TCM-KNN algorithm
Sort
View
ACSAC
2008
IEEE
13 years 10 months ago
Behavior-Profile Clustering for False Alert Reduction in Anomaly Detection Sensors
Anomaly Detection (AD) sensors compute behavior profiles to recognize malicious or anomalous activities. The behavior of a host is checked continuously by the AD sensor and an ale...
Vanessa Frías-Martínez, Salvatore J....
AIPR
2008
IEEE
13 years 10 months ago
Detection of ephemeral changes in sequences of images
The formalism of anomalous change detection, which was developed for finding unusual changes in pairs of images, is extended to sequences of more than two images. Extended algorith...
James Theiler, Steven M. Adler-Golden
SSDBM
2005
IEEE
175views Database» more  SSDBM 2005»
14 years 1 months ago
Assumption-Free Anomaly Detection in Time Series
Recent advancements in sensor technology have made it possible to collect enormous amounts of data in real time. However, because of the sheer volume of data most of it will never...
Li Wei, Nitin Kumar, Venkata Nishanth Lolla, Eamon...
RAID
2004
Springer
14 years 1 months ago
Anomalous Payload-Based Network Intrusion Detection
We present a payload-based anomaly detector, we call PAYL, for intrusion detection. PAYL models the normal application payload of network traffic in a fully automatic, unsupervised...
Ke Wang, Salvatore J. Stolfo
CORR
2010
Springer
136views Education» more  CORR 2010»
13 years 6 months ago
NgViz: Detecting DNS Tunnels through N-Gram Visualization and Quantitative Analysis
This paper introduced NgViz, a tool that examines DNS traffic and shows anomalies in n-gram frequencies. This is accomplished by comparing input files against a fingerprint of leg...
Kenton Born, David Gustafson