Sciweavers

31 search results - page 4 / 7
» Detecting Network Anomalies Using CUSUM and EM Clustering
Sort
View
IDEAS
2008
IEEE
256views Database» more  IDEAS 2008»
14 years 20 days ago
WIDS: a sensor-based online mining wireless intrusion detection system
This paper proposes WIDS, a wireless intrusion detection system, which applies data mining clustering technique to wireless network data captured through hardware sensors for purp...
Christie I. Ezeife, Maxwell Ejelike, Akshai K. Agg...
SDM
2009
SIAM
123views Data Mining» more  SDM 2009»
14 years 3 months ago
Tracking User Mobility to Detect Suspicious Behavior.
Popularity of mobile devices is accompanied by widespread security problems, such as MAC address spoofing in wireless networks. We propose a probabilistic approach to temporal an...
Gaurav Tandon, Philip K. Chan
RAID
2004
Springer
13 years 11 months ago
Seurat: A Pointillist Approach to Anomaly Detection
Abstract. This paper proposes a new approach to detecting aggregated anomalous events by correlating host file system changes across space and time. Our approach is based on a key...
Yinglian Xie, Hyang-Ah Kim, David R. O'Hallaron, M...
ICDE
2005
IEEE
161views Database» more  ICDE 2005»
14 years 7 months ago
Network-Based Problem Detection for Distributed Systems
We introduce a network-based problem detection framework for distributed systems, which includes a data-mining method for discovering dynamic dependencies among distributed servic...
Hisashi Kashima, Tadashi Tsumura, Tsuyoshi Id&eacu...
ICDM
2009
IEEE
137views Data Mining» more  ICDM 2009»
14 years 28 days ago
A Local Scalable Distributed Expectation Maximization Algorithm for Large Peer-to-Peer Networks
This paper offers a local distributed algorithm for expectation maximization in large peer-to-peer environments. The algorithm can be used for a variety of well-known data mining...
Kanishka Bhaduri, Ashok N. Srivastava