In this paper we present methodological advances in anomaly detection, which, among other purposes, can be used to discover abnormal traffic patterns under the presence of deterministic trends in data, given that specific assumptions about the traffic type and nature are met. A performance study of the proposed methods, both if these assumptions are fulfilled and violated, shows good results in great generality. Our study features VoIP call counts, but the methodology can be applied to any data following, at least roughly, a non-homogeneous Poisson process (think of highly aggregated traffic flows). © 2012 ITC
Self-similarity analysis and anomaly detection in networks are interesting fields of research and sc...
The control of communication networks critically relies on procedures capable of detecting unanticip...
peer reviewedAnalyzing communication flows on the network can help to improve the overall quality it...
In this paper we present methodological advances in anomaly detection, which, among other purposes, ...
Abstract—In this paper we present methodological advances in anomaly detection, which, among other p...
In this paper we present methodological advances in anomaly detection tailored to discover abnormal ...
We consider the problem of traffic anomaly detection in IP networks. Traffic anomalies typically ari...
Abstract—We consider the problem of traffic anomaly detection in IP networks. Traffic anomalies typi...
Abstract—We propose two methods for traffic anomaly detection in communication networks where proper...
Abstract—We study the parameters (knobs) of distribution-based anomaly detection methods, and how th...
The control of communication networks critically relies on procedures capable of detecting unanticip...
We present the longitudinal trending analysis of traffic anomalies on a trans-Pacific backbone netwo...
International audienceIn this work we develop an approach for anomaly detection for large scale netw...
VoIP applications allow us fast and cheap communication over the internet. Due to the massive expans...
Abstract—In this paper a few methods for anomaly detection in computer networks with the use of time...
Self-similarity analysis and anomaly detection in networks are interesting fields of research and sc...
The control of communication networks critically relies on procedures capable of detecting unanticip...
peer reviewedAnalyzing communication flows on the network can help to improve the overall quality it...
In this paper we present methodological advances in anomaly detection, which, among other purposes, ...
Abstract—In this paper we present methodological advances in anomaly detection, which, among other p...
In this paper we present methodological advances in anomaly detection tailored to discover abnormal ...
We consider the problem of traffic anomaly detection in IP networks. Traffic anomalies typically ari...
Abstract—We consider the problem of traffic anomaly detection in IP networks. Traffic anomalies typi...
Abstract—We propose two methods for traffic anomaly detection in communication networks where proper...
Abstract—We study the parameters (knobs) of distribution-based anomaly detection methods, and how th...
The control of communication networks critically relies on procedures capable of detecting unanticip...
We present the longitudinal trending analysis of traffic anomalies on a trans-Pacific backbone netwo...
International audienceIn this work we develop an approach for anomaly detection for large scale netw...
VoIP applications allow us fast and cheap communication over the internet. Due to the massive expans...
Abstract—In this paper a few methods for anomaly detection in computer networks with the use of time...
Self-similarity analysis and anomaly detection in networks are interesting fields of research and sc...
The control of communication networks critically relies on procedures capable of detecting unanticip...
peer reviewedAnalyzing communication flows on the network can help to improve the overall quality it...