State of the art Event detection
نویسندگان
چکیده
The problem of event detection is far from being new. This is a classical problem in many contexts. Many studies target event detection in the dynamics of various systems [7]. Two main approaches are followed, named anomaly-based and signature-based. The underlying principle of anomaly-based approaches [4, 3] is that one knows the normal behavior of the system. Then, any observation that differs from this normal behavior is considered as an event. This approach is very appealing as it is able to detect any kind of event, including kinds that were never observed. It however relies on a precise knowledge of the dynamics of the considered object, and evolution of the normal behavior makes the method ineffective. In the case of the internet topology, these two limitations make this approach unapplicable. Signature-based approaches rely on the knowledge of characteristic features of events to detect, which may be inferred from a set of known events (typically with machine learning techniques) [18, 7]. If the observed dynamics matches these features at some point, then one considers that this is an event. This approach is very effective in cases where the events may be described, like some computer viruses for instance. In our case, though, very limited knowledge of events in the internet, and no description on their impact on observed topology, are available. Much attention has been paid to event detection in internet traffic, see for instance [1, 15, 23, 19, 13, 16, 9, 5, 10]. The methods used are mainly based on the quantity of traffic; some works study the whole traffic, and some subdivise the multi-dimensional space induced by the origin and destination of the traffic; some works also correlate informations from different sites [8]. These works have produced valuable results, but the strategies based on the volume have reached their limits, mainly due to the scale-free nature of the IP traffic that makes outlier detection difficult if not impossible.
منابع مشابه
Field effect transistor nanobiosensors: State-of-the-art and key challenges as point of care testing devices
The existing health care systems focus on treating diseases rather than preventing them. Patients are generally not tested unless physiological symptoms are appeared. When they do get tested, the results often take several days and can be inconclusive if the disease is at an early stage. In order to facilitate the diagnostics process and make tests more readily available for patients, the conce...
متن کاملDeath-Thinking and its Relation to Heidegger’s Art-Thinking
Heidegger’s Art thinking is the result of his later thought. But the death-thinking is attendant with “Being thinking” in the whole of his thought. In fundamental ontology, “Being” is understood through “Dasein”. The problem of Dasein historicity and temporality led heidegger to contemplate about death. After “turning,” death thinking, it was followed through the “Event (Ereignis) thinking”. In...
متن کاملOnline multiple people tracking-by-detection in crowded scenes
Multiple people detection and tracking is a challenging task in real-world crowded scenes. In this paper, we have presented an online multiple people tracking-by-detection approach with a single camera. We have detected objects with deformable part models and a visual background extractor. In the tracking phase we have used a combination of support vector machine (SVM) person-specific classifie...
متن کاملUnauthenticated event detection in wireless sensor networks using sensors co-coverage
Wireless Sensor Networks (WSNs) offer inherent packet redundancy since each point within the network area is covered by more than one sensor node. This phenomenon, which is known as sensors co-coverage, is used in this paper to detect unauthenticated events. Unauthenticated event broadcasting in a WSN imposes network congestion, worsens the packet loss rate, and increases the network energy con...
متن کاملGraph-based Visual Saliency Model using Background Color
Visual saliency is a cognitive psychology concept that makes some stimuli of a scene stand out relative to their neighbors and attract our attention. Computing visual saliency is a topic of recent interest. Here, we propose a graph-based method for saliency detection, which contains three stages: pre-processing, initial saliency detection and final saliency detection. The initial saliency map i...
متن کاملEcole Polytechnique de Louvain
13 1 Video intelligent systems.............................................................................1-15 1.1 State of the art of applications ....................................................................1-15 1.1.1 Components and requirements.......................................................................... 1-16 1.1.2 Applications ..............................................
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2011