Sciweavers

765 search results - page 3 / 153
» Detecting Anomalies and Intruders
Sort
View
ICDCS
2012
IEEE
11 years 7 months ago
Tiresias: Online Anomaly Detection for Hierarchical Operational Network Data
Operational network data, management data such as customer care call logs and equipment system logs, is a very important source of information for network operators to detect prob...
Chi-Yao Hong, Matthew Caesar, Nick G. Duffield, Ji...
GLOBECOM
2006
IEEE
13 years 11 months ago
A Game Theoretic Approach to Detect Network Intrusions: The Cooperative Intruders Scenario
Abstract— In this paper, we consider the problem of detecting intrusions initiated by cooperative malicious nodes in infrastructure-based networks. We achieve this objective by s...
Mona Mehrandish, Hadi Otrok, Mourad Debbabi, Chadi...
KDD
2003
ACM
155views Data Mining» more  KDD 2003»
14 years 5 months ago
Graph-based anomaly detection
Anomaly detection is an area that has received much attention in recent years. It has a wide variety of applications, including fraud detection and network intrusion detection. A ...
Caleb C. Noble, Diane J. Cook
MVA
2000
139views Computer Vision» more  MVA 2000»
13 years 6 months ago
Automatic Intruder Detection and Tracking System with Pan-Tilt-Zoom Camera
We propose an automatic monitoring system which detects and tracks intruders, using a pan-tiltzoom camera. Detection is based on a background subtraction method which detects the ...
Tetsuji Haga, Hideto Fujiwara, Kazuhiko Sumi
CN
1999
93views more  CN 1999»
13 years 5 months ago
Bro: a system for detecting network intruders in real-time
We describe Bro, a stand-alone system for detecting network intruders in real-time by passively monitoring a network link over which the intruder's traffic transits. We give ...
Vern Paxson