The dataset is first analyzed on a basic level by looking at the correlations between number of measurements and average download speed for every day. Second, our PCA-based methodology applied on the dataset, taking into account many factors, including the number of correlated measurements. The results from each analysis is compared and evaluated. Based on the results, we give insights to just how efficient the tested methods are and what improvements that can be made on the methods.This thesis investigates the efficiency of a methodology that first performs a Principal Component Analysis (PCA), followed by applying a threshold-based algorithm with a static threshold to detect potential network degradation and network attacks. Then a proof of c...
Nowadays Intrusion detection systems (IDS) are very important for every information technology compa...
International audienceWe introduce a novel real time anomaly intrusion detection method using a mult...
Many network monitoring applications and performance analysis tools are based on the study of an agg...
The dataset is first analyzed on a basic level by looking at the correlations between number of measu...
Statistical anomaly detection (SAD) is an important component of securing modern networks facing con...
Detecting anomalous traffic is a crucial part of managing IP networks. In recent years, network-wide...
Abstract—Robust statistics is a branch of statistics which includes statistical methods capable of d...
Detecting scanning in Internet traffic is a well-studied topic with no single, definitive approach. ...
Nowadays, Internet has serious security problems and net-work failures that are hard to resolve, for...
Research into network anomaly detection has become crucial as a result of a significant increase in ...
The rising complexity of network anomalies necessitates increased attention to developing new techni...
As the number, complexity and diversity of cyber threats continue to increase in network infrastruct...
In the last years, the problem of detecting anomalies and attacks by statistically inspecting the ne...
International audienceThe crucial future role of Internet in society makes of network monitoring a c...
Summarization: There has been growing interest in building large-scale distributed monitoring system...
Nowadays Intrusion detection systems (IDS) are very important for every information technology compa...
International audienceWe introduce a novel real time anomaly intrusion detection method using a mult...
Many network monitoring applications and performance analysis tools are based on the study of an agg...
The dataset is first analyzed on a basic level by looking at the correlations between number of measu...
Statistical anomaly detection (SAD) is an important component of securing modern networks facing con...
Detecting anomalous traffic is a crucial part of managing IP networks. In recent years, network-wide...
Abstract—Robust statistics is a branch of statistics which includes statistical methods capable of d...
Detecting scanning in Internet traffic is a well-studied topic with no single, definitive approach. ...
Nowadays, Internet has serious security problems and net-work failures that are hard to resolve, for...
Research into network anomaly detection has become crucial as a result of a significant increase in ...
The rising complexity of network anomalies necessitates increased attention to developing new techni...
As the number, complexity and diversity of cyber threats continue to increase in network infrastruct...
In the last years, the problem of detecting anomalies and attacks by statistically inspecting the ne...
International audienceThe crucial future role of Internet in society makes of network monitoring a c...
Summarization: There has been growing interest in building large-scale distributed monitoring system...
Nowadays Intrusion detection systems (IDS) are very important for every information technology compa...
International audienceWe introduce a novel real time anomaly intrusion detection method using a mult...
Many network monitoring applications and performance analysis tools are based on the study of an agg...