In this paper we present methodological advances in anomaly detection, which, among other purposes, can be used to discover abnormal traffic patterns under the presence of deterministic trends in data, given that specific assumptions about the traffic type and nature are met. A performance study of the proposed methods, both if these assumptions are fulfilled and violated, shows good results in great generality. Our study features VoIP call counts, but the methodology can be applied to any data following, at least roughly, a non-homogeneous Poisson process (think of highly aggregated traffic flows)
Load characterization, overload prediction, and load anomaly detection for voice over IP traffic. Ma...
Network traffic anomalies stand for a large fraction of the Internet traffic andcompromise the perfo...
VoIP applications allow us fast and cheap communication over the internet. Due to the massive expans...
In this paper we present methodological advances in anomaly detection, which, among other purposes, ...
Abstract—In this paper we present methodological advances in anomaly detection, which, among other p...
In this paper we present methodological advances in anomaly detection tailored to discover abnormal ...
Abstract—We consider the problem of traffic anomaly detection in IP networks. Traffic anomalies typi...
We consider the problem of traffic anomaly detection in IP networks. Traffic anomalies typically ari...
Self-similarity analysis and anomaly detection in networks are interesting fields of research and sc...
Abstract—We study the parameters (knobs) of distribution-based anomaly detection methods, and how th...
The control of communication networks critically relies on procedures capable of detecting unanticip...
Abstract—We propose two methods for traffic anomaly detection in communication networks where proper...
The control of communication networks critically relies on procedures capable of detecting unanticip...
This work proposes a detection scheme that identifies non-conforming behavior in a VoIP network, bas...
We present a new anomaly detector for data traffic, `SMS', based on combining random projections (sk...
Load characterization, overload prediction, and load anomaly detection for voice over IP traffic. Ma...
Network traffic anomalies stand for a large fraction of the Internet traffic andcompromise the perfo...
VoIP applications allow us fast and cheap communication over the internet. Due to the massive expans...
In this paper we present methodological advances in anomaly detection, which, among other purposes, ...
Abstract—In this paper we present methodological advances in anomaly detection, which, among other p...
In this paper we present methodological advances in anomaly detection tailored to discover abnormal ...
Abstract—We consider the problem of traffic anomaly detection in IP networks. Traffic anomalies typi...
We consider the problem of traffic anomaly detection in IP networks. Traffic anomalies typically ari...
Self-similarity analysis and anomaly detection in networks are interesting fields of research and sc...
Abstract—We study the parameters (knobs) of distribution-based anomaly detection methods, and how th...
The control of communication networks critically relies on procedures capable of detecting unanticip...
Abstract—We propose two methods for traffic anomaly detection in communication networks where proper...
The control of communication networks critically relies on procedures capable of detecting unanticip...
This work proposes a detection scheme that identifies non-conforming behavior in a VoIP network, bas...
We present a new anomaly detector for data traffic, `SMS', based on combining random projections (sk...
Load characterization, overload prediction, and load anomaly detection for voice over IP traffic. Ma...
Network traffic anomalies stand for a large fraction of the Internet traffic andcompromise the perfo...
VoIP applications allow us fast and cheap communication over the internet. Due to the massive expans...