State of the art Event detection

نویسندگان

  • Clémence Magnien
  • Ravi Kumar
  • Jasmine Novak
  • Andrew Tomkins
  • A. Lakhina
  • M. Crovella
چکیده

The problem of event detection is far from being new. This is a classical problem in many contexts. Many studies target event detection in the dynamics of various systems [7]. Two main approaches are followed, named anomaly-based and signature-based. The underlying principle of anomaly-based approaches [4, 3] is that one knows the normal behavior of the system. Then, any observation that differs from this normal behavior is considered as an event. This approach is very appealing as it is able to detect any kind of event, including kinds that were never observed. It however relies on a precise knowledge of the dynamics of the considered object, and evolution of the normal behavior makes the method ineffective. In the case of the internet topology, these two limitations make this approach unapplicable. Signature-based approaches rely on the knowledge of characteristic features of events to detect, which may be inferred from a set of known events (typically with machine learning techniques) [18, 7]. If the observed dynamics matches these features at some point, then one considers that this is an event. This approach is very effective in cases where the events may be described, like some computer viruses for instance. In our case, though, very limited knowledge of events in the internet, and no description on their impact on observed topology, are available. Much attention has been paid to event detection in internet traffic, see for instance [1, 15, 23, 19, 13, 16, 9, 5, 10]. The methods used are mainly based on the quantity of traffic; some works study the whole traffic, and some subdivise the multi-dimensional space induced by the origin and destination of the traffic; some works also correlate informations from different sites [8]. These works have produced valuable results, but the strategies based on the volume have reached their limits, mainly due to the scale-free nature of the IP traffic that makes outlier detection difficult if not impossible.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Field effect transistor nanobiosensors: State-of-the-art and key challenges as point of care testing devices

The existing health care systems focus on treating diseases rather than preventing them. Patients are generally not tested unless physiological symptoms are appeared. When they do get tested, the results often take several days and can be inconclusive if the disease is at an early stage. In order to facilitate the diagnostics process and make tests more readily available for patients, the conce...

متن کامل

Death-Thinking and its Relation to Heidegger’s Art-Thinking

Heidegger’s Art thinking is the result of his later thought. But the death-thinking is attendant with “Being thinking” in the whole of his thought. In fundamental ontology, “Being” is understood through “Dasein”. The problem of Dasein historicity and temporality led heidegger to contemplate about death. After “turning,” death thinking, it was followed through the “Event (Ereignis) thinking”. In...

متن کامل

Online multiple people tracking-by-detection in crowded scenes

Multiple people detection and tracking is a challenging task in real-world crowded scenes. In this paper, we have presented an online multiple people tracking-by-detection approach with a single camera. We have detected objects with deformable part models and a visual background extractor. In the tracking phase we have used a combination of support vector machine (SVM) person-specific classifie...

متن کامل

Unauthenticated event detection in wireless sensor networks using sensors co-coverage

Wireless Sensor Networks (WSNs) offer inherent packet redundancy since each point within the network area is covered by more than one sensor node. This phenomenon, which is known as sensors co-coverage, is used in this paper to detect unauthenticated events. Unauthenticated event broadcasting in a WSN imposes network congestion, worsens the packet loss rate, and increases the network energy con...

متن کامل

Graph-based Visual Saliency Model using Background Color

Visual saliency is a cognitive psychology concept that makes some stimuli of a scene stand out relative to their neighbors and attract our attention. Computing visual saliency is a topic of recent interest. Here, we propose a graph-based method for saliency detection, which contains three stages: pre-processing, initial saliency detection and final saliency detection. The initial saliency map i...

متن کامل

Ecole Polytechnique de Louvain

13 1 Video intelligent systems.............................................................................1-15 1.1 State of the art of applications ....................................................................1-15 1.1.1 Components and requirements.......................................................................... 1-16 1.1.2 Applications ..............................................

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2011