Sciweavers

INFOCOM
2010
IEEE
13 years 3 months ago
A Signal Processing View on Packet Sampling and Anomaly Detection
—Anomaly detection methods typically operate on pre-processed, i.e., sampled and aggregated, traffic traces. Most traffic capturing devices today employ random packet sampling,...
Daniela Brauckhoff, Kavé Salamatian, Martin...
INFOCOM
2010
IEEE
13 years 3 months ago
URCA: Pulling out Anomalies by their Root Causes
—Traffic anomaly detection has received a lot of attention over recent years, but understanding the nature of these anomalies and identifying the flows involved is still a manu...
Fernando Silveira, Christophe Diot
ISI
2008
Springer
13 years 3 months ago
Anomaly detection in high-dimensional network data streams: A case study
In this paper, we study the problem of anomaly detection in high-dimensional network streams. We have developed a new technique, called Stream Projected Ouliter deTector (SPOT), t...
Ji Zhang, Qigang Gao, Hai H. Wang
SAC
2008
ACM
13 years 4 months ago
Anomaly detection algorithms in logs of process aware systems
Today, there is a variety of systems that support business process as a whole or partially. However, normative systems are not appropriate for some domains (e.g. health care) as a...
Fábio de Lima Bezerra, Jacques Wainer
COMCOM
2004
79views more  COMCOM 2004»
13 years 4 months ago
Anomaly detection methods in wired networks: a survey and taxonomy
Despite the advances reached along the last 20 years, anomaly detection in network behavior is still an immature technology, and the shortage of commercial tools thus corroborates...
Juan M. Estévez-Tapiador, Pedro Garcia-Teod...
JNCA
2007
136views more  JNCA 2007»
13 years 4 months ago
Adaptive anomaly detection with evolving connectionist systems
Anomaly detection holds great potential for detecting previously unknown attacks. In order to be effective in a practical environment, anomaly detection systems have to be capable...
Yihua Liao, V. Rao Vemuri, Alejandro Pasos
JIFS
2007
82views more  JIFS 2007»
13 years 4 months ago
Anomaly detection in mobile communication networks using the self-organizing map
Anomaly detection is a pattern recognition task whose goal is to report the occurrence of abnormal or unknown behavior in a given system being monitored. In this paper we propose a...
Rewbenio A. Frota, Guilherme De A. Barreto, Jo&ati...
TCSV
2008
139views more  TCSV 2008»
13 years 4 months ago
Trajectory-Based Anomalous Event Detection
Abstract--During the last years, the task of automatic event analysis in video sequences has gained an increasing attention among the research community. The application domains ar...
Claudio Piciarelli, Christian Micheloni, Gian Luca...
IJNSEC
2007
125views more  IJNSEC 2007»
13 years 4 months ago
An Observation-Centric Analysis on the Modeling of Anomaly-based Intrusion Detection
It is generally agreed that two key points always attract special concerns during the modelling of anomaly-based intrusion detection. One is the techniques about discerning two cl...
Zonghua Zhang, Hong Shen, Yingpeng Sang
PAMI
2006
193views more  PAMI 2006»
13 years 4 months ago
A System for Learning Statistical Motion Patterns
Analysis of motion patterns is an effective approach for anomaly detection and behavior prediction. Current approaches for the analysis of motion patterns depend on known scenes, w...
Weiming Hu, Xuejuan Xiao, Zhouyu Fu, Dan Xie, Tien...