Anomaly Detection in Partially Observed Traffic Networks
نویسندگان
چکیده
منابع مشابه
Anomaly Detection with Partially Observed Anomalies
In this paper, we consider the problem of anomaly detection. Previous studies mostly deal with this task in either supervised or unsupervised manner according to whether label information is available. However, there always exists settings which are different from the two standard manners. In this paper, we address the scenario when anomalies are partially observed, i.e., we are given a large a...
متن کاملNetwork Traffic Anomaly Detection
This paper presents a tutorial for network anomaly detection, focusing on non-signature-based approaches. Network traffic anomalies are unusual and significant changes in the traffic of a network. Networks play an important role in today’s social and economic infrastructures. The security of the network becomes crucial, and network traffic anomaly detection constitutes an important part of netw...
متن کاملNetwork Traffic Anomaly Detection Using Recurrent Neural Networks
We show that a recurrent neural network is able to learn a model to represent sequences of communications between computers on a network and can be used to identify outlier network traffic. Defending computer networks is a challenging problem and is typically addressed by manually identifying known malicious actor behavior and then specifying rules to recognize such behavior in network communic...
متن کاملSpreading paths in partially observed social networks
Understanding how and how far information, behaviors, or pathogens spread in social networks is an important problem, having implications for both predicting the size of epidemics, as well as for planning effective interventions. There are, however, two main challenges for inferring spreading paths in real-world networks. One is the practical difficulty of observing a dynamic process on a netwo...
متن کاملAnomaly Detection for Multimedia Traffic
In this paper we present attacks against multimedia streams and their underlying protocols and architectures. In order to describe these attacks the behavior of data sources and networks is modeled and an anomaly detection approach is chosen to detect them. The used methods are analyzed by their false alarm rate and the amount of time needed to detect an on-going attack.
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Transactions on Signal Processing
سال: 2019
ISSN: 1053-587X,1941-0476
DOI: 10.1109/tsp.2019.2892026