Sciweavers

235 search results - page 20 / 47
» Network anomaly detection with incomplete audit data
Sort
View
ICMCS
2007
IEEE
138views Multimedia» more  ICMCS 2007»
14 years 2 months ago
Differentiated Service Protection of Multimedia Transmission via Detection of Traffic Anomalies
Multimedia transmission over the Internet has its quality of service (QoS) requirement. However, Denial-of-Service (DoS) attacks launch large volumes of traffic and consume networ...
Hongli Luo, Mei-Ling Shyu
INFOCOM
2008
IEEE
14 years 2 months ago
Detecting Anomalies Using End-to-End Path Measurements
—In this paper, we propose new “low-overhead” network monitoring techniques to detect violations of path-level QoS guarantees like end-to-end delay, loss, etc. Unlike existin...
K. V. M. Naidu, Debmalya Panigrahi, Rajeev Rastogi
BROADNETS
2006
IEEE
14 years 1 months ago
A Statistical Approach to Anomaly Detection in Interdomain Routing
Abstract— A number of events such as hurricanes, earthquakes, power outages can cause large-scale failures in the Internet. These in turn cause anomalies in the interdomain routi...
Shivani Deshpande, Marina Thottan, Tin Kam Ho, Bip...
ICDM
2005
IEEE
190views Data Mining» more  ICDM 2005»
14 years 1 months ago
Neighborhood Formation and Anomaly Detection in Bipartite Graphs
Many real applications can be modeled using bipartite graphs, such as users vs. files in a P2P system, traders vs. stocks in a financial trading system, conferences vs. authors ...
Jimeng Sun, Huiming Qu, Deepayan Chakrabarti, Chri...
SDM
2009
SIAM
123views Data Mining» more  SDM 2009»
14 years 5 months ago
Tracking User Mobility to Detect Suspicious Behavior.
Popularity of mobile devices is accompanied by widespread security problems, such as MAC address spoofing in wireless networks. We propose a probabilistic approach to temporal an...
Gaurav Tandon, Philip K. Chan