This paper describes an approach to enforce dependencies between network traffic and user activities for anomaly detection. We present a framework and algorithms that analyze user actions and network events on a host according to their dependencies. Discovering these relations is useful in identifying anomalous events on a host that are caused by software flaws or malicious code. To demonstrate the feasibility of user intention-based traffic dependence analysis, we implement a prototype called CR-Miner and perform extensive experimental evaluation of the accuracy, security, and efficiency of our algorithm. The results show that our algorithm can identify user intention-based traffic dependence with high accuracy (average 99.6 % for 20 users...
Computer networks are becoming increasingly important in supporting business and everyday activities...
Monitoring network traffic and detecting anomalies are es-sential tasks that are carried out routine...
Resilience is the ability of the network to maintain an acceptable level of operation in the face of...
Abstract—This paper describes an approach to enforce depen-dencies between network traffic and user ...
Abstract-This paper describes an approach to enforce dependencies between network traffic and user a...
This paper describes an approach for enforcing dependencies between network traffic and user activit...
AbstractMalicious software activities have become more and more clandestine, making them challenging...
Studies show that a significant portion of networked com-puters are infected with stealthy malware. ...
Inter and intra-network connectivity have become a useful resource for accessibility and flexibility...
Inter and intra-network connectivity have become a useful resource for accessibility and flexibility...
Abstract: New datamining techniques are developed for generating frequent episode rules of traffic e...
ABSTRACT: We present a new datamining approach to generating frequent episode rules for building ano...
We present a novel anomaly-based detection approach capable of detecting botnet Command and Control...
Computer networks are becoming increasingly important in supporting business and everyday activities...
Computer networks are becoming increasingly important in supporting business and everyday activities...
Computer networks are becoming increasingly important in supporting business and everyday activities...
Monitoring network traffic and detecting anomalies are es-sential tasks that are carried out routine...
Resilience is the ability of the network to maintain an acceptable level of operation in the face of...
Abstract—This paper describes an approach to enforce depen-dencies between network traffic and user ...
Abstract-This paper describes an approach to enforce dependencies between network traffic and user a...
This paper describes an approach for enforcing dependencies between network traffic and user activit...
AbstractMalicious software activities have become more and more clandestine, making them challenging...
Studies show that a significant portion of networked com-puters are infected with stealthy malware. ...
Inter and intra-network connectivity have become a useful resource for accessibility and flexibility...
Inter and intra-network connectivity have become a useful resource for accessibility and flexibility...
Abstract: New datamining techniques are developed for generating frequent episode rules of traffic e...
ABSTRACT: We present a new datamining approach to generating frequent episode rules for building ano...
We present a novel anomaly-based detection approach capable of detecting botnet Command and Control...
Computer networks are becoming increasingly important in supporting business and everyday activities...
Computer networks are becoming increasingly important in supporting business and everyday activities...
Computer networks are becoming increasingly important in supporting business and everyday activities...
Monitoring network traffic and detecting anomalies are es-sential tasks that are carried out routine...
Resilience is the ability of the network to maintain an acceptable level of operation in the face of...