International audiencePrecise detection and identification of anomalous events in IP traffic are crucial in many applications. This paper intends to address this task by adopting the link stream formalism which properly captures temporal and structural features of the data. Within this framework we focus on finding anomalous behaviours with the degree of IP addresses over time. Due to diversity in IP profiles, this feature is typically distributed heterogeneously, preventing us to find anomalies. To deal with this challenge, we design a method to detect outliers as well as precisely identify their cause in a sequence of similar heterogeneous distributions. We apply it to a MAWI capture of IP traffic and we show that it succeeds at detecting...
International audienceThis paper aims at precisely detecting and identifying anomalous events in IP ...
International audienceThis paper aims at precisely detecting and identifying anomalous events in IP ...
International audienceThis paper aims at precisely detecting and identifying anomalous events in IP ...
International audiencePrecise detection and identification of anomalous events in IP traffic are cru...
International audiencePrecise detection and identification of anomalous events in IP traffic are cru...
International audiencePrecise detection and identification of anomalous events in IP traffic are cru...
International audiencePrecise detection and identification of anomalous events in IP traffic are cru...
International audiencePrecise detection and identification of anomalous events in IP traffic are cru...
International audiencePrecise detection and identification of anomalous events in IP traffic are cru...
International audiencePrecise detection and identification of anomalous events in IP traffic are cru...
International audiencePrecise detection and identification of anomalous events in IP traffic are cru...
International audiencePrecise detection and identification of anomalous events in IP traffic are cru...
International audienceThis paper aims at precisely detecting and identifying anomalous events in IP ...
International audienceThis paper aims at precisely detecting and identifying anomalous events in IP ...
International audienceThis paper aims at precisely detecting and identifying anomalous events in IP ...
International audienceThis paper aims at precisely detecting and identifying anomalous events in IP ...
International audienceThis paper aims at precisely detecting and identifying anomalous events in IP ...
International audienceThis paper aims at precisely detecting and identifying anomalous events in IP ...
International audiencePrecise detection and identification of anomalous events in IP traffic are cru...
International audiencePrecise detection and identification of anomalous events in IP traffic are cru...
International audiencePrecise detection and identification of anomalous events in IP traffic are cru...
International audiencePrecise detection and identification of anomalous events in IP traffic are cru...
International audiencePrecise detection and identification of anomalous events in IP traffic are cru...
International audiencePrecise detection and identification of anomalous events in IP traffic are cru...
International audiencePrecise detection and identification of anomalous events in IP traffic are cru...
International audiencePrecise detection and identification of anomalous events in IP traffic are cru...
International audiencePrecise detection and identification of anomalous events in IP traffic are cru...
International audienceThis paper aims at precisely detecting and identifying anomalous events in IP ...
International audienceThis paper aims at precisely detecting and identifying anomalous events in IP ...
International audienceThis paper aims at precisely detecting and identifying anomalous events in IP ...
International audienceThis paper aims at precisely detecting and identifying anomalous events in IP ...
International audienceThis paper aims at precisely detecting and identifying anomalous events in IP ...
International audienceThis paper aims at precisely detecting and identifying anomalous events in IP ...