Abstract—We study the parameters (knobs) of distribution-based anomaly detection methods, and how their tuning affects the quality of detection. Specifically, we analyze the popular entropy-based anomaly detection in detecting covert channels in Voice over IP (VoIP) traffic. There has been little effort in prior research to rigorously analyze how the knobs of anomaly detection methodology should be tuned. Such analysis is, however, critical before such methods can be deployed by a practitioner. We develop a probabilistic model to explain the effects of the tuning of the knobs on the rate of false positives and false negatives. We then study the observations produced by our model analytically as well as empirically. We examine the knobs of w...
Load characterization, overload prediction, and load anomaly detection for voice over IP traffic. Ma...
Encryption alone secures communication by preventing adversaries from easily decoding one’s transmis...
Abstract — The detection of covert channels has quickly become a vital need due to their pervasive n...
We consider the problem of traffic anomaly detection in IP networks. Traffic anomalies typically ari...
Abstract—We consider the problem of traffic anomaly detection in IP networks. Traffic anomalies typi...
Anomaly detection in computer networks yields valuable information on events relating to the compone...
In this paper we present methodological advances in anomaly detection, which, among other purposes, ...
Abstract—In this paper we present methodological advances in anomaly detection, which, among other p...
Abstract: This paper focuses on network anomaly-detection and especially the effectiveness of Machin...
Anomaly detection in computer networks yields valuable information on events relating to the compone...
Abstract. The threat of voice spam, commonly known as Spam over Internet Telephony (SPIT) is a real ...
Network anomaly detection is a broad area of research. The use of entropy and distributions of traff...
The authors describe a reliable and accurate steganalysis method for detecting covert voice-over Int...
Part 1: Anomaly DetectionInternational audienceEntropy has been widely used for anomaly detection in...
covert timing channel is based on modulation of the timing information in the network packets in a s...
Load characterization, overload prediction, and load anomaly detection for voice over IP traffic. Ma...
Encryption alone secures communication by preventing adversaries from easily decoding one’s transmis...
Abstract — The detection of covert channels has quickly become a vital need due to their pervasive n...
We consider the problem of traffic anomaly detection in IP networks. Traffic anomalies typically ari...
Abstract—We consider the problem of traffic anomaly detection in IP networks. Traffic anomalies typi...
Anomaly detection in computer networks yields valuable information on events relating to the compone...
In this paper we present methodological advances in anomaly detection, which, among other purposes, ...
Abstract—In this paper we present methodological advances in anomaly detection, which, among other p...
Abstract: This paper focuses on network anomaly-detection and especially the effectiveness of Machin...
Anomaly detection in computer networks yields valuable information on events relating to the compone...
Abstract. The threat of voice spam, commonly known as Spam over Internet Telephony (SPIT) is a real ...
Network anomaly detection is a broad area of research. The use of entropy and distributions of traff...
The authors describe a reliable and accurate steganalysis method for detecting covert voice-over Int...
Part 1: Anomaly DetectionInternational audienceEntropy has been widely used for anomaly detection in...
covert timing channel is based on modulation of the timing information in the network packets in a s...
Load characterization, overload prediction, and load anomaly detection for voice over IP traffic. Ma...
Encryption alone secures communication by preventing adversaries from easily decoding one’s transmis...
Abstract — The detection of covert channels has quickly become a vital need due to their pervasive n...