Sciweavers

21 search results - page 3 / 5
» Baseline Profile Stability for Network Anomaly Detection
Sort
View
CORR
2010
Springer
92views Education» more  CORR 2010»
14 years 8 months ago
Network Intrusion Detection Using FP Tree Rules
----------------------------------------------ABSTRACT-------------------------------------------In the faceless world of the Internet, online fraud is one of the greatest reasons ...
P. Srinivasulu, J. Ranga Rao, I. Ramesh Babu
ICPR
2008
IEEE
15 years 10 months ago
Wire detection in low-altitude, urban, and low-quality video frames
We introduce a novel wire detection algorithm for use in low altitude urban aircraft reconnaissance. A line profile model is described and effectively used to discriminate wires f...
Dmitry B. Goldgof, Joshua Candamo
RAID
2004
Springer
15 years 2 months ago
Anomalous Payload-Based Network Intrusion Detection
We present a payload-based anomaly detector, we call PAYL, for intrusion detection. PAYL models the normal application payload of network traffic in a fully automatic, unsupervised...
Ke Wang, Salvatore J. Stolfo
JSAC
2006
95views more  JSAC 2006»
14 years 9 months ago
Impact of Packet Sampling on Portscan Detection
Abstract-- Packet sampling is commonly deployed in highspeed backbone routers to minimize resources used for network monitoring. It is known that packet sampling distorts traffic s...
Jianning Mai, Ashwin Sridharan, Chen-Nee Chuah, Hu...
98
Voted
NETWORKING
2004
14 years 10 months ago
On Detection of Anomalous Routing Dynamics in BGP
BGP, the de facto inter-domain routing protocol, is the core component of current Internet infrastructure. BGP traffic deserves thorough exploration, since abnormal BGP routing dy...
Ke Zhang, Amy Yen, Xiaoliang Zhao, Daniel Massey, ...