نتایج جستجو برای: anomaly detection

تعداد نتایج: 591345  

2003

Hidden Markov Model (HMM) has been successfully used in speech recognition and some classification areas. Since Anomaly Intrusion Detection can be treated as a classification problem, we proposed some basic idea on using HMM model to modeling user's behavior. Then we tried HMM modeling on the real SIAC company log data. The results are not good, the reasons are: 1. SIAC data gives us too little...

Journal: :JNW 2013
Zhizhong Wu Xuehai Zhou Jun Xu

In this paper we present an information fusion based distributed anomaly detection system for Android mobile phones. The proposed framework realizes a clientserver architecture, the client continuously extracts various features and transfers to the server, and the server’s major task is to detect anomaly using state-of-art detection algorithms implemented as anomaly detectors. Multiple distribu...

Journal: :CoRR 2012
Manoj Rameshchandra Thakur Sugata Sanyal

In this paper, we suggest a multi-dimensional approach towards intrusion detection. Network and system usage parameters like source and destination IP addresses; source and destination ports; incoming and outgoing network traffic data rate and number of CPU cycles per request are divided into multiple dimensions. Rather than analyzing raw bytes of data corresponding to the values of the network...

Journal: :CoRR 2018
Houssam Zenati Chuan Sheng Foo Bruno Lecouat Gaurav Manek Vijay Ramaseshan Chandrasekhar

Generative adversarial networks (GANs) are able to model the complex highdimensional distributions of real-world data, which suggests they could be effective for anomaly detection. However, few works have explored the use of GANs for the anomaly detection task. We leverage recently developed GAN models for anomaly detection, and achieve state-of-the-art performance on image and network intrusio...

Journal: :Entropy 2015
Przemyslaw Berezinski Bartosz Jasiul Marcin Szpyrka

Data mining is an interdisciplinary subfield of computer science involving methods at the intersection of artificial intelligence, machine learning and statistics. One of the data mining tasks is anomaly detection which is the analysis of large quantities of data to identify items, events or observations which do not conform to an expected pattern. Anomaly detection is applicable in a variety o...

2014
Yuan Liu Xiaofeng Wang Kaiyu Liu

Network anomaly detection has been focused on by more people with the fast development of computer network. Some researchers utilized fusion method and DS evidence theory to do network anomaly detection but with low performance, and they did not consider features of network-complicated and varied. To achieve high detection rate, we present a novel network anomaly detection system with optimized...

Journal: :Signal Processing 2016
Bo Du Rui Zhao Liangpei Zhang Lefei Zhang

Anomaly detection is one of the most popular applications in hyperspectral remote sensing image analysis. Anomaly detection technique does not require any prior features or information of targets of interest and has draw the increasing interest in target detection domain for hyperspectral imagery (HSI) in the recent twenty years. From hyperspectral data, the approximately continuous spectral fe...

Journal: :IEICE Transactions 2012
Masato Uchida Shuichi Nawata Yu Gu Masato Tsuru Yuji Oie

We propose an anomaly detection method for finding patterns in network traffic that do not conform to legitimate (i.e., normal) behavior. The proposed method trains a baseline model describing the normal behavior of network traffic without using manually labeled traffic data. The trained baseline model is used as the basis for comparison with the audit network traffic. This anomaly detection wo...

2014
Mahsa Salehi Christopher Leckie Masud Moshtaghi Tharshan Vaithianathan

Anomaly detection in data streams plays a vital role in online data mining applications. A major challenge for anomaly detection is the dynamically changing nature of many monitoring environments. This causes a problem for traditional anomaly detection techniques in data streams, which assume a relatively static monitoring environment. In an environment that is intermittently changing (known as...

2006
Isaac O. Osunmakinde Anet Potgieter

Anomaly detection in telecommunications data tries to discover deviant behaviour of individual subscribers, including for example: detection of inconsistencies in call data, such as customer churn or attrition, potential fraud, deliberate or unintended expensive mistakes in call data, and so on. These have consequently led to unquantifiable loss of revenue to many telecommunication networks wor...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید