نتایج جستجو برای: statistical anomaly detection

تعداد نتایج: 939306  

Journal: :IJMCMC 2014
Stevan Novakov Chung-Horng Lung Ioannis Lambadaris Nabil Seddigh

Research into network anomaly detection has become crucial as a result of a significant increase in the number of computer attacks. Many approaches in network anomaly detection have been reported in the literature, but data or solutions typically are not freely available. Recently, a labeled network traffic flow dataset, Kyoto2006+, has been created and is publicly available. Most existing appr...

2003
Levent Ertöz Eric Eilertson Aleksandar Lazarevic Pang-Ning Tan Paul Dokas Vipin Kumar Jaideep Srivastava

This paper introduces the Minnesota Intrusion Detection System (MINDS), which uses a suite of data mining techniques to automatically detect attacks against computer networks and systems. While the long-term objective of MINDS is to address all aspects of intrusion detection, in this paper we present two specific contributions. First, we present MINDS anomaly detection module that assigns a sco...

Internet of Things is an ever-growing network of heterogeneous and constraint nodes which are connected to each other and the Internet. Security plays an important role in such networks. Experience has proved that encryption and authentication are not enough for the security of networks and an Intrusion Detection System is required to detect and to prevent attacks from malicious nodes. In this ...

2014
Sree Deepthi

Anomaly detection is the identification of items, events or observations which do not conform to an expected pattern or other items in a dataset. Typically the anomalous items will translate to some kind of problem such as bank fraud, a structural defect, medical problems or finding errors in text. Anomalies are also referred to as outliers, novelties, noise, deviations and exceptions. Many tec...

Abbas Ghaemi Bafghi Amin Rasoulifard

In this paper, a boosting-based incremental hybrid intrusion detection system is introduced. This system combines incremental misuse detection and incremental anomaly detection. We use boosting ensemble of weak classifiers to implement misuse intrusion detection system. It can identify new classes types of intrusions that do not exist in the training dataset for incremental misuse detection. As...

2017
Mohamad Farhan Mohamad Mohsin Azuraliza Abu Bakar Abdul Razak Hamdan

The dendrite cell algorithm (DCA) relies on the multi-context antigen value (MCAV) to determine the abnormality of a record by comparing it with anomaly threshold. In practice, the threshold is pre-determined before mining based on previous information and the existing MCAV is inefficient when expose to extreme values. This causes the DCA fails to detect unlabeled data if the new pattern distin...

Journal: :IEEE Trans. Signal Processing 2003
Marina Thottan Chuanyi Ji

Network anomaly detection is a vibrant research area. Researchers have approached this problem using various techniques such as artificial intelligence, machine learning, and state machine modeling. In this paper, we first review these anomaly detection methods and then describe in detail a statistical signal processing technique based on abrupt change detection. We show that this signal proces...

2007
Jian Zhou Haruhiko Shirai Isamu Takahashi Jousuke Kuroiwa Tomohiro Odaka Hisakazu Ogura

A new anomaly detection method based on models of user behavior at the command level is proposed as an intrusion detection technique. The hybrid command sequence (HCS) model is trained from historical session data by a genetic algorithm, and then it is used as the criterion in verifying observed behavior. The proposed model considers the occurrence of multiple command sequence fragments in a si...

2006
Qinyu Liu Na Wen Zhengyu Liu

[1] To investigate the observed atmospheric response to SST variability in the North Pacific, the Maximum Covariance Analysis is performed between the monthly sea surface temperature anomaly (SSTA) and the 500-hPa geopotential height anomaly over the North Pacific using observations of the period 1958–1993. In addition to the strong remote ENSO impact in winter months, the MCA analysis suggests...

2003
Matthew V. Mahoney Philip K. Chan

We investigate potential simulation artifacts and their effects on the evaluation of network anomaly detection systems in the 1999 DARPA/MIT Lincoln Laboratory off-line intrusion detection evaluation data set. A statistical comparison of the simulated background and training traffic with real traffic collected from a university departmental server suggests the presence of artifacts that could a...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید