This work studies systems and methods for anomaly detection in computer networks. At first, basic categories of network security systems and number of methods used for anomaly detection are briefly described. The core of the work is an optimization of the method based on detection of changes in distributions of packet features originally proposed by Lakhina et al. This method is described in detail and two optimizations of it are proposed -- first is focused to speed and memory efficiency, second improves its detection capabilities. Next, a software created to test these optimizations is briefly described and results of experiments on real data with artificially generated and also real anomalies are presented
The aim of this thesis was to develop a practically applicable set of methods for classification and...
Abstract. Intrusion detection corresponds to a suite of techniques that can be used to identify atta...
Abstract—Anomaly detection in network traffic is an important technique for identifying operation an...
This work deals with implementation three methods for anomaly detection in computer networks. At fir...
This work in progress outlines a comparison of anomaly detection methods that we are undertaking. We...
Detecting intrusions falls into two categories: anomaly detection and misuse detection. The former r...
The goal of this thesis is to familiarize myself, and the reader, with the issues surrounding anomal...
This master thesis deals with detecting anomalies methods in network traffic. First of all this thes...
Network anomaly detection is an effective way to detect intrusions which defends our computer system...
Anomaly detection is fundamental to ensure reliability and security in computer networks. In this wo...
Nowadays, there is a huge and growing concern about security in information and communication techno...
7 pages. 1 more figure than final CDC 2013 versionWe present five methods to the problem of network ...
Abstract — We present five methods to the problem of net-work anomaly detection. These methods cover...
As information systems become increasingly complex and pervasive, they become inextricably intertwin...
Today, network security is crucial due to the rapid development of network and internet technologies...
The aim of this thesis was to develop a practically applicable set of methods for classification and...
Abstract. Intrusion detection corresponds to a suite of techniques that can be used to identify atta...
Abstract—Anomaly detection in network traffic is an important technique for identifying operation an...
This work deals with implementation three methods for anomaly detection in computer networks. At fir...
This work in progress outlines a comparison of anomaly detection methods that we are undertaking. We...
Detecting intrusions falls into two categories: anomaly detection and misuse detection. The former r...
The goal of this thesis is to familiarize myself, and the reader, with the issues surrounding anomal...
This master thesis deals with detecting anomalies methods in network traffic. First of all this thes...
Network anomaly detection is an effective way to detect intrusions which defends our computer system...
Anomaly detection is fundamental to ensure reliability and security in computer networks. In this wo...
Nowadays, there is a huge and growing concern about security in information and communication techno...
7 pages. 1 more figure than final CDC 2013 versionWe present five methods to the problem of network ...
Abstract — We present five methods to the problem of net-work anomaly detection. These methods cover...
As information systems become increasingly complex and pervasive, they become inextricably intertwin...
Today, network security is crucial due to the rapid development of network and internet technologies...
The aim of this thesis was to develop a practically applicable set of methods for classification and...
Abstract. Intrusion detection corresponds to a suite of techniques that can be used to identify atta...
Abstract—Anomaly detection in network traffic is an important technique for identifying operation an...