Existing anomaly detection systems do not reliably produce accurate severity ratings for detected network events, which results in network operators wasting a large amount of time and effort in investigating false alarms. This project investigates the use of data fusion to combine evidence from multiple anomaly detection methods to produce a consistent and accurate representation of the severity of a network event. Four new detection methods were added to Netevmon, a network anomaly detection framework, and ground truth was collected from a latency training dataset to calculate the set of probabilities required for each of the five data fusion methods chosen for testing. The evaluation was performed against a second test dataset containing ...
In our present work we introduce the use of data fusion in the field of DoS anomaly detection. We pr...
Abstract Network Anomaly Detection is still an open challenging task that aims to detect anomalous n...
Anomaly detection has become a crucial part of the protection of information and integrity. Due to t...
Any future extensions or updates will be published as a part of WAND's ongoing research projects: ht...
The ability to detect unexpected events in large networks can be a significant benefit to daily netw...
Rapid progress of networking technologies leads to an exponential growth in the number of unauthoriz...
Network traffic anomalies stand for a large fraction of the Internet traffic andcompromise the perfo...
Copyright © 2008 ACM, Inc.Anomalous events that affect the performance of networks are a fact of lif...
Rapid progress of networking technologies leads to an exponential growth in the number of unauthoriz...
Abstract: New datamining techniques are developed for generating frequent episode rules of traffic e...
While the Dempster-Shafer theory of evidence has been widely used in anomaly detection, there are so...
Network attacks remain a constant threat to organizations around the globe. Intrusion detection syst...
Abstract. Intrusion detection corresponds to a suite of techniques that can be used to identify atta...
Today, network security is crucial due to the rapid development of network and internet technologies...
Identifying anomalies in network traffic logs is a very challenging task for a network analyst. With...
In our present work we introduce the use of data fusion in the field of DoS anomaly detection. We pr...
Abstract Network Anomaly Detection is still an open challenging task that aims to detect anomalous n...
Anomaly detection has become a crucial part of the protection of information and integrity. Due to t...
Any future extensions or updates will be published as a part of WAND's ongoing research projects: ht...
The ability to detect unexpected events in large networks can be a significant benefit to daily netw...
Rapid progress of networking technologies leads to an exponential growth in the number of unauthoriz...
Network traffic anomalies stand for a large fraction of the Internet traffic andcompromise the perfo...
Copyright © 2008 ACM, Inc.Anomalous events that affect the performance of networks are a fact of lif...
Rapid progress of networking technologies leads to an exponential growth in the number of unauthoriz...
Abstract: New datamining techniques are developed for generating frequent episode rules of traffic e...
While the Dempster-Shafer theory of evidence has been widely used in anomaly detection, there are so...
Network attacks remain a constant threat to organizations around the globe. Intrusion detection syst...
Abstract. Intrusion detection corresponds to a suite of techniques that can be used to identify atta...
Today, network security is crucial due to the rapid development of network and internet technologies...
Identifying anomalies in network traffic logs is a very challenging task for a network analyst. With...
In our present work we introduce the use of data fusion in the field of DoS anomaly detection. We pr...
Abstract Network Anomaly Detection is still an open challenging task that aims to detect anomalous n...
Anomaly detection has become a crucial part of the protection of information and integrity. Due to t...