Sciweavers

12 search results - page 1 / 3
» The need for simulation in evaluating anomaly detectors
Sort
View
CCR
2008
86views more  CCR 2008»
13 years 4 months ago
The need for simulation in evaluating anomaly detectors
Anomalous events that affect the performance of networks are a fact of life. It is therefore not surprising that recent years have seen an explosion in research on network anomaly...
Haakon Ringberg, Matthew Roughan, Jennifer Rexford
TON
2008
106views more  TON 2008»
13 years 4 months ago
Statistical techniques for detecting traffic anomalies through packet header data
This paper proposes a traffic anomaly detector, operated in postmortem and in real-time, by passively monitoring packet headers of traffic. The frequent attacks on network infrastr...
Seong Soo Kim, A. L. Narasimha Reddy
RAID
2009
Springer
13 years 11 months ago
Protecting a Moving Target: Addressing Web Application Concept Drift
Because of the ad hoc nature of web applications, intrusion detection systems that leverage machine learning techniques are particularly well-suited for protecting websites. The re...
Federico Maggi, William K. Robertson, Christopher ...
IPPS
2006
IEEE
13 years 10 months ago
Instability in parallel job scheduling simulation: the role of workload flurries
The performance of computer systems depends, among other things, on the workload. This motivates the use of real workloads (as recorded in activity logs) to drive simulations of n...
Dan Tsafrir, Dror G. Feitelson
INFOCOM
2011
IEEE
12 years 7 months ago
Forwarding anomalies in Bloom filter-based multicast
Abstract—Several recently proposed multicast protocols use inpacket Bloom filters to encode multicast trees. These mechanisms are in principle highly scalable because no per-fl...
Mikko Särelä, Christian Esteve Rothenber...