Sciweavers

JSAC
2006
95views more  JSAC 2006»
13 years 4 months ago
Impact of Packet Sampling on Portscan Detection
Abstract-- Packet sampling is commonly deployed in highspeed backbone routers to minimize resources used for network monitoring. It is known that packet sampling distorts traffic s...
Jianning Mai, Ashwin Sridharan, Chen-Nee Chuah, Hu...
ISI
2006
Springer
13 years 4 months ago
Motion-Alert: Automatic Anomaly Detection in Massive Moving Objects
Abstract. With recent advances in sensory and mobile computing technology, enormous amounts of data about moving objects are being collected. With such data, it becomes possible to...
Xiaolei Li, Jiawei Han, Sangkyum Kim
ISI
2008
Springer
13 years 4 months ago
Analysis of cyberactivism: A case study of online free Tibet activities
In this paper, we study the problem of anomaly detection in high-dimensional network streams. We have developed a new technique, called Stream Projected Ouliter deTector (SPOT), t...
Tianjun Fu, Hsinchun Chen
COMCOM
2007
98views more  COMCOM 2007»
13 years 4 months ago
Anomaly detection in TCP/IP networks using immune systems paradigm
The paper presents an architecture of an anomaly detection system based on the paradigm of artificial immune systems (AISs). Incoming network traffic data are considered by the s...
Franciszek Seredynski, Pascal Bouvry
CN
2007
168views more  CN 2007»
13 years 4 months ago
Network anomaly detection with incomplete audit data
With the ever increasing deployment and usage of gigabit networks, traditional network anomaly detection based Intrusion Detection Systems (IDS) have not scaled accordingly. Most,...
Animesh Patcha, Jung-Min Park
IJNSEC
2008
131views more  IJNSEC 2008»
13 years 4 months ago
Performance Analysis of Soft Computing Based Anomaly Detectors
Anomaly detectors have become a necessary component of the computer and information security framework. Some of the numerous drawbacks experienced by the current Anomaly detectors...
N. Srinivasan, V. Vaidehi
CSDA
2010
124views more  CSDA 2010»
13 years 4 months ago
Statistical inference on attributed random graphs: Fusion of graph features and content
Abstract: Fusion of information from graph features and content can provide superior inference for an anomaly detection task, compared to the corresponding content-only or graph fe...
John Grothendieck, Carey E. Priebe, Allen L. Gorin
CORR
2008
Springer
106views Education» more  CORR 2008»
13 years 4 months ago
Dempster-Shafer for Anomaly Detection
In this paper, we implement an anomaly detection system using the Dempster-Shafer method. Using two standard benchmark problems we show that by combining multiple signals it is pos...
Qi Chen, Uwe Aickelin
CORR
2010
Springer
206views Education» more  CORR 2010»
13 years 4 months ago
Detecting Anomalous Process Behaviour using Second Generation Artificial Immune Systems
Abstract. Artificial immune systems (AISs) are problem-solving systems inspired by the biological immune system. They have been successfully applied to a number of problem domains ...
Jamie Twycross, Uwe Aickelin, Amanda M. Whitbrook
CORR
2010
Springer
167views Education» more  CORR 2010»
13 years 4 months ago
The DCA:SOMe Comparison A comparative study between two biologically-inspired algorithms
The Dendritic Cell Algorithm (DCA) is an immune-inspired algorithm, developed for the purpose of anomaly detection. The algorithm performs multi-sensor data fusion and correlation ...
Julie Greensmith, Jan Feyereisl, Uwe Aickelin