During the last decade, anomaly detection has attracted the attention of many researchers to overcome the weakness of signature-based IDSs in detecting novel attacks. However, hav...
Mahbod Tavallaee, Wei Lu, Shah Arif Iqbal, Ali A. ...
Abstract—Detecting the occurrence and location of performance anomalies (e.g., high jitter or loss events) is critical to ensuring the effective operation of network infrastructu...
Paul Barford, Nick G. Duffield, Amos Ron, Joel Som...
Abstract--Large-scale attacks like Distributed Denial-ofService (DDoS) attacks still pose unpredictable threats to the Internet infrastructure and Internet-based business. Thus, ma...
With the ever increasing deployment and usage of gigabit networks, traditional network anomaly detection based Intrusion Detection Systems (IDS) have not scaled accordingly. Most,...