Sciweavers

765 search results - page 93 / 153
» Detecting Anomalies and Intruders
Sort
View
IMC
2005
ACM
15 years 5 months ago
Network Anomography
Anomaly detection is a first and important step needed to respond to unexpected problems and to assure high performance and security in IP networks. We introduce a framework and ...
Yin Zhang, Zihui Ge, Albert G. Greenberg, Matthew ...
CCS
2008
ACM
15 years 1 months ago
The risk-utility tradeoff for IP address truncation
Network operators are reluctant to share traffic data due to security and privacy concerns. Consequently, there is a lack of publicly available traces for validating and generaliz...
Martin Burkhart, Daniela Brauckhoff, Martin May, E...
IADIS
2004
15 years 1 months ago
A note on the distribution of packet arrivals in high-speed data networks
A simple explanation is given of an anomaly often detected in traffic measurement when packet timings are truncated to nearest whole numbers. The correct observed discrete distrib...
Vic Grout, Stuart Cunningham, Denise Oram, Rich He...
CORR
2006
Springer
152views Education» more  CORR 2006»
14 years 12 months ago
APHRODITE: an Anomaly-based Architecture for False Positive Reduction
We present APHRODITE, an architecture designed to reduce false positives in network intrusion-detection systems. APHRODITE works by detecting anomalies in the outgoing traffic, an...
Damiano Bolzoni, Sandro Etalle

Publication
226views
13 years 10 months ago
Modelling Multi-object Activity by Gaussian Processes
We present a new approach for activity modelling and anomaly detection based on non-parametric Gaussian Process (GP) models. Specifically, GP regression models are formulated to l...
Chen Change Loy, Tao Xiang, Shaogang Gong