Part 7: NetworkingInternational audienceEntropy-based anomaly detection has recently been extensively studied in order to overcome weaknesses of traditional volume and rule based approaches to network flows analysis. From many entropy measures only Shannon, Titchener and parameterized Renyi and Tsallis entropies have been applied to network anomaly detection. In the paper, our method based on parameterized entropy and supervised learning is presented. With this method we are able to detect a broad spectrum of anomalies with low false positive rate. In addition, we provide information revealing the anomaly type. The experimental results suggest that our method performs better than Shannon-based and volume-based approach
In this article, we address the problem of not only id entifying phenomena, but also attributing the...
AbstractIn this paper, a technique for detecting anomalous behavior traffic in a computer network is...
The increasing practicality of large-scale flow capture makes it possible to conceive of traffic ana...
Part 7: NetworkingInternational audienceEntropy-based anomaly detection has recently been extensivel...
Data mining is an interdisciplinary subfield of computer science involving methods at the intersecti...
We develop a behavior-based anomaly detection method that detects network anomalies by comparing the...
Anomaly-based Intrusion Detection is a key research topic in network security due to its ability to ...
Part 1: Anomaly DetectionInternational audienceEntropy has been widely used for anomaly detection in...
Monitoring the empirical Shannon entropy of a feature in a network packet stream has previously been...
Today, the Internet allows virtually anytime, anywhere access to a seemingly unlimited supply of inf...
Detecting anomalous traffic with low false alarm rates is of primary interest in IP networks managem...
The problem of traffic anomalies in computer networks is analyzed. NetFlow packets are used as netwo...
Network traffic anomaly may indicate a possible intrusion in the network and therefore anomaly detec...
Network anomaly detection is a broad area of research. The use of entropy and distributions of traff...
Promotor: Marcin Szpyrka, Bartosz Jasiul.Recenzent: Jan Bazan, Wojciech Mazurczyk.Niepublikowana pra...
In this article, we address the problem of not only id entifying phenomena, but also attributing the...
AbstractIn this paper, a technique for detecting anomalous behavior traffic in a computer network is...
The increasing practicality of large-scale flow capture makes it possible to conceive of traffic ana...
Part 7: NetworkingInternational audienceEntropy-based anomaly detection has recently been extensivel...
Data mining is an interdisciplinary subfield of computer science involving methods at the intersecti...
We develop a behavior-based anomaly detection method that detects network anomalies by comparing the...
Anomaly-based Intrusion Detection is a key research topic in network security due to its ability to ...
Part 1: Anomaly DetectionInternational audienceEntropy has been widely used for anomaly detection in...
Monitoring the empirical Shannon entropy of a feature in a network packet stream has previously been...
Today, the Internet allows virtually anytime, anywhere access to a seemingly unlimited supply of inf...
Detecting anomalous traffic with low false alarm rates is of primary interest in IP networks managem...
The problem of traffic anomalies in computer networks is analyzed. NetFlow packets are used as netwo...
Network traffic anomaly may indicate a possible intrusion in the network and therefore anomaly detec...
Network anomaly detection is a broad area of research. The use of entropy and distributions of traff...
Promotor: Marcin Szpyrka, Bartosz Jasiul.Recenzent: Jan Bazan, Wojciech Mazurczyk.Niepublikowana pra...
In this article, we address the problem of not only id entifying phenomena, but also attributing the...
AbstractIn this paper, a technique for detecting anomalous behavior traffic in a computer network is...
The increasing practicality of large-scale flow capture makes it possible to conceive of traffic ana...