In my thesis I present a distributed mechanism based on Principal Component Analysis (PCA) to profile the behavior of the legitimate users in telephone networks. The idea is to take advantage of probes distributed over the network to obtain a compact snapshot of the users they serve. A collector node collects and effectively combines such information to gather the description of the legitimate-user behavior. Eventually, it distributes the profile to probes, which perform anomaly detection. Experimental results on five weeks of phone data collected by a telecom operator show that the profiling mechanism is stable over time and allows an operator to decentralize the anomaly detection stage directly to its probes. Furthermore, when compared to a c...
Tato práce se zabývá detekcí anomálií v počítačových sítích. Konkrétní metoda, jež bude dále popsána...
The article deals with detection of network anomalies. Network anomalies include everything that is ...
Currently, multiple personal machines and network systems suffer some type of computer attack with ...
Abstract — In this paper we present a distributed mechanism based on Principal Component Analysis (P...
IP Telephony has become very popular and Session Initiation Protocol (SIP)-based telephony systems a...
The topic of this thesis is fraud detection in mobile communications networks by means of user profi...
Word processed copy.Includes bibliographical references (leaves 118-121).In this research, we presen...
Statistical Machine Learning methods are employed to improve network security (email spam filtering,...
Thesis (Ph.D.)--Boston UniversityPLEASE NOTE: Boston University Libraries did not receive an Authori...
Intrusion detection systems (IDS) have often been used to analyse network traffic to help network ad...
Anomaly detection in computer networks yields valuable information on events relating to the compone...
Anomaly detection in telecommunications data tries to discover deviant behaviour of individual subsc...
The multivariate approach based on Principal Component Analysis (PCA) for anomaly detection received...
Statistical anomaly detection (SAD) is an important component of securing modern networks facing con...
Principal component analysis and the residual error is an effective anomaly detection technique. In ...
Tato práce se zabývá detekcí anomálií v počítačových sítích. Konkrétní metoda, jež bude dále popsána...
The article deals with detection of network anomalies. Network anomalies include everything that is ...
Currently, multiple personal machines and network systems suffer some type of computer attack with ...
Abstract — In this paper we present a distributed mechanism based on Principal Component Analysis (P...
IP Telephony has become very popular and Session Initiation Protocol (SIP)-based telephony systems a...
The topic of this thesis is fraud detection in mobile communications networks by means of user profi...
Word processed copy.Includes bibliographical references (leaves 118-121).In this research, we presen...
Statistical Machine Learning methods are employed to improve network security (email spam filtering,...
Thesis (Ph.D.)--Boston UniversityPLEASE NOTE: Boston University Libraries did not receive an Authori...
Intrusion detection systems (IDS) have often been used to analyse network traffic to help network ad...
Anomaly detection in computer networks yields valuable information on events relating to the compone...
Anomaly detection in telecommunications data tries to discover deviant behaviour of individual subsc...
The multivariate approach based on Principal Component Analysis (PCA) for anomaly detection received...
Statistical anomaly detection (SAD) is an important component of securing modern networks facing con...
Principal component analysis and the residual error is an effective anomaly detection technique. In ...
Tato práce se zabývá detekcí anomálií v počítačových sítích. Konkrétní metoda, jež bude dále popsána...
The article deals with detection of network anomalies. Network anomalies include everything that is ...
Currently, multiple personal machines and network systems suffer some type of computer attack with ...