Sciweavers

255 search results - page 6 / 51
» Timing Anomalies Reloaded
Sort
View
DSN
2008
IEEE
15 years 6 months ago
Anomaly? application change? or workload change? towards automated detection of application performance anomaly and change
: Automated tools for understanding application behavior and its changes during the application life-cycle are essential for many performance analysis and debugging tasks. Applicat...
Ludmila Cherkasova, Kivanc M. Ozonat, Ningfang Mi,...
ISMIS
2005
Springer
15 years 5 months ago
Anomaly Detection in Computer Security and an Application to File System Accesses
Abstract. We present an overview of anomaly detection used in computer security, and provide a detailed example of a host-based Intrusion Detection System that monitors file syste...
Salvatore J. Stolfo, Shlomo Hershkop, Linh H. Bui,...
TON
2008
106views more  TON 2008»
14 years 11 months ago
Statistical techniques for detecting traffic anomalies through packet header data
This paper proposes a traffic anomaly detector, operated in postmortem and in real-time, by passively monitoring packet headers of traffic. The frequent attacks on network infrastr...
Seong Soo Kim, A. L. Narasimha Reddy
79
Voted
PKDD
2010
Springer
141views Data Mining» more  PKDD 2010»
14 years 9 months ago
On Detecting Clustered Anomalies Using SCiForest
Detecting local clustered anomalies is an intricate problem for many existing anomaly detection methods. Distance-based and density-based methods are inherently restricted by their...
Fei Tony Liu, Kai Ming Ting, Zhi-Hua Zhou
DSOM
2007
Springer
15 years 5 months ago
NADA - Network Anomaly Detection Algorithm
This paper deals with a new iterative Network Anomaly Detection Algorithm – NADA, which accomplishes the detection, classification and identification of traffic anomalies. NADA f...
Silvia Farraposo, Philippe Owezarski, Edmundo Mont...