Due to abuse by insiders or penetration by outsiders, network systems usually suffer various security issues. In order to achieve high dependable and low cost monitoring, this paper proposes a dependable monitoring mechanism combining static threshold-based and dynamic anomaly detection. Firstly, the performance metrics of host and network are collected through different methods. In static threshold-based detection phase, the secondary metrics are combined to several group items. When any group item exceeds its threshold, dynamic detection methods are adopt to further detect anomaly. In dynamic detection phase, PCA, joint Gaussian distribution, and Bayesian classification are combined to achieve low cost and efficient anomaly detection. Exp...
Anomaly detection in dynamic communication networks has many important security applications. These ...
Smart building equipment and automation systems often become a target of attacks and are used for at...
The growth of the Internet and consequently, the number of interconnected computers through a shared...
Anomaly-based Detection Systems (ADSs) attempt to learn the features of behaviors and events of a sy...
Abstract—In this paper, we propose a Progressive Differ-ential Thresholding (PDT) framework for coor...
Data analysis of complex behaviors, intrusion attacks and system failures inherent in the Informatio...
Statistical anomaly detection (SAD) is an important component of securing modern networks facing con...
Abstract: High-performance computing clusters have be-come critical computing resources in many sens...
Summarization: There has been growing interest in building large-scale distributed monitoring system...
In the last years, the problem of detecting anomalies and attacks by statistically inspecting the ne...
Abstract. In this paper we introduce GAFT (Generalized Anomaly and Fault Threshold), featuring a nov...
Information systems and their services (referred to as cyberspace) are ubiquitous and touch all aspe...
Anomaly detection is fundamental to ensure reliability and security in computer networks. In this wo...
The impact of an anomaly is domain-dependent. In a dataset of network activities, an anomaly can imp...
As the communication industry has connected distant corners of the globe using advances in network ...
Anomaly detection in dynamic communication networks has many important security applications. These ...
Smart building equipment and automation systems often become a target of attacks and are used for at...
The growth of the Internet and consequently, the number of interconnected computers through a shared...
Anomaly-based Detection Systems (ADSs) attempt to learn the features of behaviors and events of a sy...
Abstract—In this paper, we propose a Progressive Differ-ential Thresholding (PDT) framework for coor...
Data analysis of complex behaviors, intrusion attacks and system failures inherent in the Informatio...
Statistical anomaly detection (SAD) is an important component of securing modern networks facing con...
Abstract: High-performance computing clusters have be-come critical computing resources in many sens...
Summarization: There has been growing interest in building large-scale distributed monitoring system...
In the last years, the problem of detecting anomalies and attacks by statistically inspecting the ne...
Abstract. In this paper we introduce GAFT (Generalized Anomaly and Fault Threshold), featuring a nov...
Information systems and their services (referred to as cyberspace) are ubiquitous and touch all aspe...
Anomaly detection is fundamental to ensure reliability and security in computer networks. In this wo...
The impact of an anomaly is domain-dependent. In a dataset of network activities, an anomaly can imp...
As the communication industry has connected distant corners of the globe using advances in network ...
Anomaly detection in dynamic communication networks has many important security applications. These ...
Smart building equipment and automation systems often become a target of attacks and are used for at...
The growth of the Internet and consequently, the number of interconnected computers through a shared...