Abstract. This paper provides a new framework for efficient detection and identification of network anomalies over high speed links, in early stage of its occurrence to quickly react by taking the appropriate counter-measures. The proposed framework is based on change point detection in counters value of reversible sketch, which aggregates multiple data streams from high speed links in a stretched database. To detect net-work anomalies, we apply the cumulative sum (CUSUM) algorithm at the counter value of each bucket in the proposed reversible sketch, to detect change point occurrence and to uncover culprit flows via a new approach for sketch inversion. Theoretical framework for attacks detec-tion is presented. We also give the results of o...
An anomaly detection procedure is defined and its sta-tistical performance are carefully quantified....
A key function for network traffic monitoring and analysis is the ability to perform aggregate queri...
International audienceAn anomaly detection procedure is defined and its statistical performance are ...
International audienceThis paper provides a new framework for efficient detection and identification...
Abstract—In this paper, we propose an efficient framework for online detection and identification of...
With the ever-increasing link speeds and traffic volumes of the Internet, monitoring and analyzing n...
In this paper, we present the design and implementation of a new approach for anomaly detection and ...
International audienceWith the rapid dependency on the internet for business, and the fast spread of...
Abstract—With the rapid dependency on the internet for business, and the fast spread of powerful des...
Abstract A key function for network trafc monitoring and analysis is the ability to perform aggrega...
In the last years, the ever increasing number of network attacks has brought the research attention ...
We propose a novel and efficient method for on-line detection of network anomalies that lead to chan...
Abstract—Anomaly detection in high speed networks is well known to be a challenging problem. It requ...
The increasing number of network attacks causes growing problems for network operators and users. Th...
A key function for network trafc monitoring and analysis is the ability to perform aggregate queries...
An anomaly detection procedure is defined and its sta-tistical performance are carefully quantified....
A key function for network traffic monitoring and analysis is the ability to perform aggregate queri...
International audienceAn anomaly detection procedure is defined and its statistical performance are ...
International audienceThis paper provides a new framework for efficient detection and identification...
Abstract—In this paper, we propose an efficient framework for online detection and identification of...
With the ever-increasing link speeds and traffic volumes of the Internet, monitoring and analyzing n...
In this paper, we present the design and implementation of a new approach for anomaly detection and ...
International audienceWith the rapid dependency on the internet for business, and the fast spread of...
Abstract—With the rapid dependency on the internet for business, and the fast spread of powerful des...
Abstract A key function for network trafc monitoring and analysis is the ability to perform aggrega...
In the last years, the ever increasing number of network attacks has brought the research attention ...
We propose a novel and efficient method for on-line detection of network anomalies that lead to chan...
Abstract—Anomaly detection in high speed networks is well known to be a challenging problem. It requ...
The increasing number of network attacks causes growing problems for network operators and users. Th...
A key function for network trafc monitoring and analysis is the ability to perform aggregate queries...
An anomaly detection procedure is defined and its sta-tistical performance are carefully quantified....
A key function for network traffic monitoring and analysis is the ability to perform aggregate queri...
International audienceAn anomaly detection procedure is defined and its statistical performance are ...