Anomaly detection is fundamental to ensure reliability and security in computer networks. In this work, it is proposed an anomaly detection system that monitors the network in three different levels. In the first one, data is collected from Simple Network Management Protocol (SNMP) objects and compared to profiles of normal traffic, in order to detect behavior changes. Second level of analysis includes a dependency graph that represents the relationships between SNMP objects. It is used to analyze first level alerts, confirming the occurrence of anomalies in device level. In the third level of analysis, second level alerts are grouped according to network topology information, and network administrators are informed about the context where ...
Anomalies could be the threats to the network that have ever/never happened. To protect networks aga...
Abstract. Intrusion detection corresponds to a suite of techniques that can be used to identify atta...
This work in progress outlines a comparison of anomaly detection methods that we are undertaking. We...
Abstract- Anomaly detection is fundamental to ensure reliability and security in computer networks. ...
This work proposes a parameterized anomaly detection system, based on the method known as profile ba...
Besides identifying anomalies, detection systems must offer additional information about the occurre...
The aim of this thesis was to develop a practically applicable set of methods for classification and...
Nowadays, there is a huge and growing concern about security in information and communication techno...
This work studies systems and methods for anomaly detection in computer networks. At first, basic ca...
Resumo: Anomalias em redes de computadores são desvios súbitos e acentuados que ocorrem no tráfego e...
A problem of network traffic anomalies detection in the computer networks is analyzed. Overview of a...
Information systems and their services (referred to as cyberspace) are ubiquitous and touch all aspe...
Network traffic anomalies stand for a large fraction of the Internet traffic andcompromise the perfo...
A problem of network traffic anomalies detection in the computer networks is analyzed. Overview of a...
Abstract: New datamining techniques are developed for generating frequent episode rules of traffic e...
Anomalies could be the threats to the network that have ever/never happened. To protect networks aga...
Abstract. Intrusion detection corresponds to a suite of techniques that can be used to identify atta...
This work in progress outlines a comparison of anomaly detection methods that we are undertaking. We...
Abstract- Anomaly detection is fundamental to ensure reliability and security in computer networks. ...
This work proposes a parameterized anomaly detection system, based on the method known as profile ba...
Besides identifying anomalies, detection systems must offer additional information about the occurre...
The aim of this thesis was to develop a practically applicable set of methods for classification and...
Nowadays, there is a huge and growing concern about security in information and communication techno...
This work studies systems and methods for anomaly detection in computer networks. At first, basic ca...
Resumo: Anomalias em redes de computadores são desvios súbitos e acentuados que ocorrem no tráfego e...
A problem of network traffic anomalies detection in the computer networks is analyzed. Overview of a...
Information systems and their services (referred to as cyberspace) are ubiquitous and touch all aspe...
Network traffic anomalies stand for a large fraction of the Internet traffic andcompromise the perfo...
A problem of network traffic anomalies detection in the computer networks is analyzed. Overview of a...
Abstract: New datamining techniques are developed for generating frequent episode rules of traffic e...
Anomalies could be the threats to the network that have ever/never happened. To protect networks aga...
Abstract. Intrusion detection corresponds to a suite of techniques that can be used to identify atta...
This work in progress outlines a comparison of anomaly detection methods that we are undertaking. We...