Identifying anomalies in computer networks is a challenging and complex problem. Often, anomalies occur in extremely local areas of the network. Locality is complex in this setting, since we have an underlying graph structure. To identify local anomalies, we introduce a scan statistic for data extracted from the edges of a graph over time. In the computer network setting, the data on these edges are multivariate measures of the communications between two distinct machines, over time. We describe two shapes for capturing locality in the graph: the star and the k-path. While the star shape is not new to the literature, the path shape, when used as a scan window, appears to be novel. Both of these shapes are motivated by hacker beha...
Network anomaly detection solutions are being used as defense against several attacks, especially th...
Anomaly detection is an area that has received much attention in recent years. It has a wide variety...
Detecting anomalies and events in data is a vital task, with numerous applications in security, fina...
Identifying anomalies in computer networks is a challenging and complex problem. Often, anomalies oc...
Anomaly detection in dynamic communication networks has many important security applications. These ...
Abstract A scan statistic methodology for detecting anomalies has been developed for application to ...
The ability to mine data represented as a graph has become important in several domains for detectin...
MasterIn recent years, network traffic anomaly detection has become an important area for both acade...
Dynamic networks, also called network streams, are an im-portant data representation that applies to...
Many social and economic systems can be represented as attributed networks encoding the relations be...
Many social and economic systems can be represented as attributed networks encoding the relations be...
AbstractA scan statistic methodology for detecting anomalies has been developed for application to g...
Many social economic systems can be represented as attributed networks encoding the relations betwee...
Thesis (Ph.D.)--Boston UniversityPLEASE NOTE: Boston University Libraries did not receive an Authori...
The search for anomalies or outliers in large-scale network data has important se-curity application...
Network anomaly detection solutions are being used as defense against several attacks, especially th...
Anomaly detection is an area that has received much attention in recent years. It has a wide variety...
Detecting anomalies and events in data is a vital task, with numerous applications in security, fina...
Identifying anomalies in computer networks is a challenging and complex problem. Often, anomalies oc...
Anomaly detection in dynamic communication networks has many important security applications. These ...
Abstract A scan statistic methodology for detecting anomalies has been developed for application to ...
The ability to mine data represented as a graph has become important in several domains for detectin...
MasterIn recent years, network traffic anomaly detection has become an important area for both acade...
Dynamic networks, also called network streams, are an im-portant data representation that applies to...
Many social and economic systems can be represented as attributed networks encoding the relations be...
Many social and economic systems can be represented as attributed networks encoding the relations be...
AbstractA scan statistic methodology for detecting anomalies has been developed for application to g...
Many social economic systems can be represented as attributed networks encoding the relations betwee...
Thesis (Ph.D.)--Boston UniversityPLEASE NOTE: Boston University Libraries did not receive an Authori...
The search for anomalies or outliers in large-scale network data has important se-curity application...
Network anomaly detection solutions are being used as defense against several attacks, especially th...
Anomaly detection is an area that has received much attention in recent years. It has a wide variety...
Detecting anomalies and events in data is a vital task, with numerous applications in security, fina...