In this paper, we study the problem of anomaly detection in high-dimensional network streams. We have developed a new technique, called Stream Projected Ouliter deTector (SPOT), to deal with the problem of anomaly detection from high-dimensional data streams. We conduct a case study of SPOT in this paper by deploying it on 1999 KDD Intrusion Detection application. Inno-vative approaches for training data generation, anomaly classifi-cation and false positive reduction are proposed in this paper as well. Experimental results demonstrate that SPOT is effective in detecting anomalies from network data streams and outperforms existing anomaly detection methods.
While the network anomaly detection is essential in network operations and management, it becomes fu...
Today, network security is crucial due to the rapid development of network and internet technologies...
Multiple multi-dimensional data streams are ubiquitous in the modern world, such as IoT applications...
A great deal of research attention has been paid to data mining on data streams in recent years. In ...
A great deal of research attention has been paid to data mining on data streams in recent years. In ...
The unprecedented explosion of real-life big data sets have sparked a lot of research interests in d...
© 2015 Dr. Mahsa SalehiAnomaly detection in data streams plays a vital role in on-line data mining a...
In recent years, intrusion detection has emerged as an important technique for network security. Mac...
These days many companies has marketed the big data streams in numerous applications including indus...
Cyber threats are a severed challenge in current communications networks. Several security measures ...
This work studies systems and methods for anomaly detection in computer networks. At first, basic ca...
Multiple multi-dimensional data streams are ubiquitous in the modern world, such as IoT applications...
Multiple multi-dimensional data streams are ubiquitous in the modern world, such as IoT applications...
As information systems become increasingly complex and pervasive, they become inextricably intertwin...
Multiple multi-dimensional data streams are ubiquitous in the modern world, such as IoT applications...
While the network anomaly detection is essential in network operations and management, it becomes fu...
Today, network security is crucial due to the rapid development of network and internet technologies...
Multiple multi-dimensional data streams are ubiquitous in the modern world, such as IoT applications...
A great deal of research attention has been paid to data mining on data streams in recent years. In ...
A great deal of research attention has been paid to data mining on data streams in recent years. In ...
The unprecedented explosion of real-life big data sets have sparked a lot of research interests in d...
© 2015 Dr. Mahsa SalehiAnomaly detection in data streams plays a vital role in on-line data mining a...
In recent years, intrusion detection has emerged as an important technique for network security. Mac...
These days many companies has marketed the big data streams in numerous applications including indus...
Cyber threats are a severed challenge in current communications networks. Several security measures ...
This work studies systems and methods for anomaly detection in computer networks. At first, basic ca...
Multiple multi-dimensional data streams are ubiquitous in the modern world, such as IoT applications...
Multiple multi-dimensional data streams are ubiquitous in the modern world, such as IoT applications...
As information systems become increasingly complex and pervasive, they become inextricably intertwin...
Multiple multi-dimensional data streams are ubiquitous in the modern world, such as IoT applications...
While the network anomaly detection is essential in network operations and management, it becomes fu...
Today, network security is crucial due to the rapid development of network and internet technologies...
Multiple multi-dimensional data streams are ubiquitous in the modern world, such as IoT applications...