7 pages. 1 more figure than final CDC 2013 versionWe present five methods to the problem of network anomaly detection. These methods cover most of the common techniques in the anomaly detection field, including Statistical Hypothesis Tests (SHT), Support Vector Machines (SVM) and clustering analysis. We evaluate all methods in a simulated network that consists of nominal data, three flow-level anomalies and one packet-level attack. Through analyzing the results, we point out the advantages and disadvantages of each method and conclude that combining the results of the individual methods can yield improved anomaly detection results
In various networks, anomaly may happen due to network breakdown, intrusion detection, and end-to-en...
The article deals with detection of network anomalies. Network anomalies include everything that is ...
International audienceIn this work we develop an approach for anomaly detection for large scale netw...
7 pages. 1 more figure than final CDC 2013 versionWe present five methods to the problem of network ...
Abstract — We present five methods to the problem of net-work anomaly detection. These methods cover...
This work in progress outlines a comparison of anomaly detection methods that we are undertaking. We...
Due to the advance in network technologies, the number of network users is growing rapidly, which le...
Thesis (Ph.D.)--Boston UniversityPLEASE NOTE: Boston University Libraries did not receive an Authori...
Thesis (Ph.D.)--Boston UniversityThis dissertation focuses on two types of problems, both of which a...
Techniques are described herein for clustering network hosts based on their network behavior to crea...
Thesis (Ph.D.)--Boston UniversityPLEASE NOTE: Boston University Libraries did not receive an Authori...
International audienceNetwork anomalies are unusual traffic mainly induced by network attacks or net...
Computer networks have nowadays assumed an increasingly important role in the expression of modern h...
Network anomaly detection is an effective way to detect intrusions which defends our computer system...
Many of the present network visitors’ analysis have the capability to capture extraordinary forms o...
In various networks, anomaly may happen due to network breakdown, intrusion detection, and end-to-en...
The article deals with detection of network anomalies. Network anomalies include everything that is ...
International audienceIn this work we develop an approach for anomaly detection for large scale netw...
7 pages. 1 more figure than final CDC 2013 versionWe present five methods to the problem of network ...
Abstract — We present five methods to the problem of net-work anomaly detection. These methods cover...
This work in progress outlines a comparison of anomaly detection methods that we are undertaking. We...
Due to the advance in network technologies, the number of network users is growing rapidly, which le...
Thesis (Ph.D.)--Boston UniversityPLEASE NOTE: Boston University Libraries did not receive an Authori...
Thesis (Ph.D.)--Boston UniversityThis dissertation focuses on two types of problems, both of which a...
Techniques are described herein for clustering network hosts based on their network behavior to crea...
Thesis (Ph.D.)--Boston UniversityPLEASE NOTE: Boston University Libraries did not receive an Authori...
International audienceNetwork anomalies are unusual traffic mainly induced by network attacks or net...
Computer networks have nowadays assumed an increasingly important role in the expression of modern h...
Network anomaly detection is an effective way to detect intrusions which defends our computer system...
Many of the present network visitors’ analysis have the capability to capture extraordinary forms o...
In various networks, anomaly may happen due to network breakdown, intrusion detection, and end-to-en...
The article deals with detection of network anomalies. Network anomalies include everything that is ...
International audienceIn this work we develop an approach for anomaly detection for large scale netw...