Principal component analysis (PCA) has received increasing attention as a method to distinguish network traffic anomalies from normal data instances based on its orthogonal linear transformation characteristics and dimensionality reduction technique. To address the issue of parameter sensitivity in the classical PCA, we propose modifications to the classical PCA, called robust PCA in this paper, which exhibits greater flexibility in detecting outliers for different traffic distributions. First, the robust PCA utilizes the Mahalanobis distance function which generates more flexible results than that of the Euclidean distance used in the classical PCA. The second modification to the classical PCA is to take into account the temporal effect of...
International audienceThe crucial future role of Internet in society makes of network monitoring a c...
In the last years, the problem of detecting anomalies and attacks by statistically inspecting the ne...
Most current intrusion detection methods cannot process large amounts of audit data for real-time op...
Abstract—Robust statistics is a branch of statistics which includes statistical methods capable of d...
International audienceSpatial Principal Component Analysis (PCA) has been proposed for network-wide ...
Detecting anomalous traffic is a crucial part of managing IP networks. In recent years, network-wide...
We consider the problem of network anomaly detection in large distributed systems. In this setting, ...
As the number, complexity and diversity of cyber threats continue to increase in network infrastruct...
Principal component analysis (PCA) is a statistical technique that has been used for data analysis a...
The rising complexity of network anomalies necessitates increased attention to developing new techni...
Research into network anomaly detection has become crucial as a result of a significant increase in ...
The multivariate approach based on Principal Component Analysis (PCA) for anomaly detection received...
Abstract—There has been growing interest in building largescale distributed monitoring systems for s...
Anomaly detection is a first and important step needed to respond to unexpected problems and to assu...
Anomaly detection is a first and important step needed to respond to unexpected problems and to assu...
International audienceThe crucial future role of Internet in society makes of network monitoring a c...
In the last years, the problem of detecting anomalies and attacks by statistically inspecting the ne...
Most current intrusion detection methods cannot process large amounts of audit data for real-time op...
Abstract—Robust statistics is a branch of statistics which includes statistical methods capable of d...
International audienceSpatial Principal Component Analysis (PCA) has been proposed for network-wide ...
Detecting anomalous traffic is a crucial part of managing IP networks. In recent years, network-wide...
We consider the problem of network anomaly detection in large distributed systems. In this setting, ...
As the number, complexity and diversity of cyber threats continue to increase in network infrastruct...
Principal component analysis (PCA) is a statistical technique that has been used for data analysis a...
The rising complexity of network anomalies necessitates increased attention to developing new techni...
Research into network anomaly detection has become crucial as a result of a significant increase in ...
The multivariate approach based on Principal Component Analysis (PCA) for anomaly detection received...
Abstract—There has been growing interest in building largescale distributed monitoring systems for s...
Anomaly detection is a first and important step needed to respond to unexpected problems and to assu...
Anomaly detection is a first and important step needed to respond to unexpected problems and to assu...
International audienceThe crucial future role of Internet in society makes of network monitoring a c...
In the last years, the problem of detecting anomalies and attacks by statistically inspecting the ne...
Most current intrusion detection methods cannot process large amounts of audit data for real-time op...