VoIP Anomaly Detection - selected methods of statistical analysis
نویسندگان
چکیده
منابع مشابه
Traffic Analysis, Statistical Anomaly Detection
In this paper, we evaluate the capability to detect traffic anomalieswith Shewhart, CUSUM, andEWMA control charts. In order to cope with seasonal variation and serial correlation, control charts are not applied to traffic measurement time-series directly, but to the prediction errors of exponential smoothing and Holt-Winters forecasting. The evaluation relies on flow data collected in an ISP ba...
متن کاملwoman-defined identity: analysis of selected poems of adrienne rich
the current thesis is composed in five chapters in the following fashion: chapter two encompasses the applied framework of the project in details; the methodology of carl gustav jung to explain the process of individuation, the major archetypes and their attributes and his techniques to assess the mind’s strata are all explained. moreover, the austrian psychoanalysts, heinz kohut’s models of a...
Statistical Analysis and Anomaly Detection of SMS Social Networks
Social network analysis has attracted intensive interests by researchers from multiple disciplines. However most of the existing work is descriptive nature, and statistical network analysis remains an active area of research. In this paper, we model and study two facets of the social networks in short message services (SMS). One is the structure of the contact networks of mobile users, the othe...
متن کاملMoving dispersion method for statistical anomaly detection in intrusion detection systems
A unified method for statistical anomaly detection in intrusion detection systems is theoretically introduced. It is based on estimating a dispersion measure of numerical or symbolic data on successive moving windows in time and finding the times when a relative change of the dispersion measure is significant. Appropriate dispersion measures, relative differences, moving windows, as well as tec...
متن کاملSIPAD: SIP-VoIP Anomaly Detection using a Stateful Rule Tree
Voice over IP (VoIP) services have become prevalent lately because of their potential advantages such as economic efficiency and useful features. Meanwhile, Session Initiation Protocol (SIP) is being widely used as a session protocol for the VoIP services. Many mobile VoIP applications have recently been launched, and they are becoming attractive targets for attackers to steal private informati...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Annales Universitatis Mariae Curie-Sklodowska, sectio AI – Informatica
سال: 2017
ISSN: 2083-3628,1732-1360
DOI: 10.17951/ai.2016.16.2.14