Abstract — We present five methods to the problem of net-work anomaly detection. These methods cover most of the common techniques in the anomaly detection field, including Statistical Hypothesis Tests (SHT), Support Vector Machines (SVM) and clustering analysis. We evaluate all methods in a simulated network that consists of nominal data, three flow-level anomalies and one packet-level attack. Through analyzing the results, we point out the advantages and disadvantages of each method and conclude that combining the results of the individual methods can yield improved anomaly detection results. I
Thesis (Ph.D.)--Boston UniversityThis dissertation focuses on two types of problems, both of which a...
Anomaly detection is fundamental to ensure reliability and security in computer networks. In this wo...
Abstract- Anomaly detection is fundamental to ensure reliability and security in computer networks. ...
7 pages. 1 more figure than final CDC 2013 versionWe present five methods to the problem of network ...
7 pages. 1 more figure than final CDC 2013 versionWe present five methods to the problem of network ...
This work in progress outlines a comparison of anomaly detection methods that we are undertaking. We...
This work studies systems and methods for anomaly detection in computer networks. At first, basic ca...
Network anomaly detection is an effective way to detect intrusions which defends our computer system...
Anomalies could be the threats to the network that have ever/never happened. To protect networks aga...
International audienceNetwork anomalies are unusual traffic mainly induced by network attacks or net...
Abstract. Intrusion detection corresponds to a suite of techniques that can be used to identify atta...
Computer networks have nowadays assumed an increasingly important role in the expression of modern h...
Abstract- An anomaly is a abnormal activity or deviation from the normal behaviour.Anomaly detection...
Nowadays, there is a huge and growing concern about security in information and communication techno...
Thesis (Ph.D.)--Boston UniversityPLEASE NOTE: Boston University Libraries did not receive an Authori...
Thesis (Ph.D.)--Boston UniversityThis dissertation focuses on two types of problems, both of which a...
Anomaly detection is fundamental to ensure reliability and security in computer networks. In this wo...
Abstract- Anomaly detection is fundamental to ensure reliability and security in computer networks. ...
7 pages. 1 more figure than final CDC 2013 versionWe present five methods to the problem of network ...
7 pages. 1 more figure than final CDC 2013 versionWe present five methods to the problem of network ...
This work in progress outlines a comparison of anomaly detection methods that we are undertaking. We...
This work studies systems and methods for anomaly detection in computer networks. At first, basic ca...
Network anomaly detection is an effective way to detect intrusions which defends our computer system...
Anomalies could be the threats to the network that have ever/never happened. To protect networks aga...
International audienceNetwork anomalies are unusual traffic mainly induced by network attacks or net...
Abstract. Intrusion detection corresponds to a suite of techniques that can be used to identify atta...
Computer networks have nowadays assumed an increasingly important role in the expression of modern h...
Abstract- An anomaly is a abnormal activity or deviation from the normal behaviour.Anomaly detection...
Nowadays, there is a huge and growing concern about security in information and communication techno...
Thesis (Ph.D.)--Boston UniversityPLEASE NOTE: Boston University Libraries did not receive an Authori...
Thesis (Ph.D.)--Boston UniversityThis dissertation focuses on two types of problems, both of which a...
Anomaly detection is fundamental to ensure reliability and security in computer networks. In this wo...
Abstract- Anomaly detection is fundamental to ensure reliability and security in computer networks. ...