Sciweavers

235 search results - page 5 / 47
» Network anomaly detection with incomplete audit data
Sort
View
ISI
2008
Springer
13 years 7 months ago
Analysis of cyberactivism: A case study of online free Tibet activities
In this paper, we study the problem of anomaly detection in high-dimensional network streams. We have developed a new technique, called Stream Projected Ouliter deTector (SPOT), t...
Tianjun Fu, Hsinchun Chen
TON
2008
106views more  TON 2008»
13 years 7 months ago
Statistical techniques for detecting traffic anomalies through packet header data
This paper proposes a traffic anomaly detector, operated in postmortem and in real-time, by passively monitoring packet headers of traffic. The frequent attacks on network infrastr...
Seong Soo Kim, A. L. Narasimha Reddy
ADBIS
2006
Springer
200views Database» more  ADBIS 2006»
14 years 1 months ago
Anomaly Detection Using Unsupervised Profiling Method in Time Series Data
The anomaly detection problem has important applications in the field of fraud detection, network robustness analysis and intrusion detection. This paper is concerned with the prob...
Zakia Ferdousi, Akira Maeda
ACSAC
2004
IEEE
13 years 11 months ago
Detecting Attacks That Exploit Application-Logic Errors Through Application-Level Auditing
Host security is achieved by securing both the operating system kernel and the privileged applications that run on top of it. Application-level bugs are more frequent than kernel-...
Jingyu Zhou, Giovanni Vigna
COMCOM
2007
98views more  COMCOM 2007»
13 years 7 months ago
Anomaly detection in TCP/IP networks using immune systems paradigm
The paper presents an architecture of an anomaly detection system based on the paradigm of artificial immune systems (AISs). Incoming network traffic data are considered by the s...
Franciszek Seredynski, Pascal Bouvry