Results 1 - 10
of
51,779
anomaly detection algorithm
"... An evaluation of automatic parameter tuning of a statistics-based ..."
anomaly detection algorithms in hyperspectral images
, 2015
"... Anomaly Detection (AD) has recently become an important application of hyperspectral images analysis. The goal of these algorithms is to find the objects in the image scene which are anomalous in comparison with their surrounding background. One way to improve the performance and runtime of these al ..."
Abstract
- Add to MetaCart
Anomaly Detection (AD) has recently become an important application of hyperspectral images analysis. The goal of these algorithms is to find the objects in the image scene which are anomalous in comparison with their surrounding background. One way to improve the performance and runtime
ANOMALY DETECTION ALGORITHMS FOR HYPERSPECTRAL IMAGERY
"... Nowadays the use of hyperspectral imagery specifically automatic target detection algorithms for these images is a relatively exciting area of research. An important challenge of hyperspectral target detection is to detect small targets without any prior knowledge, particularly when the interested t ..."
Abstract
- Add to MetaCart
Nowadays the use of hyperspectral imagery specifically automatic target detection algorithms for these images is a relatively exciting area of research. An important challenge of hyperspectral target detection is to detect small targets without any prior knowledge, particularly when the interested
Comparing Anomaly-Detection Algorithms for Keystroke Dynamics
"... Keystroke dynamics—the analysis of typing rhythms to discriminate among users—has been proposed for detecting impostors (i.e., both insiders and external attackers). Since many anomaly-detection algorithms have been proposed for this task, it is natural to ask which are the top performers (e.g., to ..."
Abstract
-
Cited by 47 (3 self)
- Add to MetaCart
Keystroke dynamics—the analysis of typing rhythms to discriminate among users—has been proposed for detecting impostors (i.e., both insiders and external attackers). Since many anomaly-detection algorithms have been proposed for this task, it is natural to ask which are the top performers (e
Application of anomaly detection algorithms for detecting SYN flooding attacks
- In Proceedings of IEEE Globecom
, 2004
"... Abstract — We investigate statistical anomaly detection algorithms for detecting SYN flooding, which is the most common type of Denial of Service (DoS) attack. The two algorithms considered are an adaptive threshold algorithm and a particular application of the cumulative sum (CUSUM) algorithm for c ..."
Abstract
-
Cited by 67 (1 self)
- Add to MetaCart
Abstract — We investigate statistical anomaly detection algorithms for detecting SYN flooding, which is the most common type of Denial of Service (DoS) attack. The two algorithms considered are an adaptive threshold algorithm and a particular application of the cumulative sum (CUSUM) algorithm
A Comparative Evaluation of Anomaly Detection Algorithms for Maritime Video Surveillance
"... A variety of anomaly detection algorithms have been applied to surveillance tasks for detecting threats with some success. However, it is not clear which anomaly detection algorithms should be used for domains such as ground-based maritime video surveillance. For example, recently introduced algorit ..."
Abstract
- Add to MetaCart
A variety of anomaly detection algorithms have been applied to surveillance tasks for detecting threats with some success. However, it is not clear which anomaly detection algorithms should be used for domains such as ground-based maritime video surveillance. For example, recently introduced
A Comparative Study of Anomaly Detection Algorithms for Detection of SIP Flooding
- in IMS,” in Proceedings of the International Conference on Internet Multimedia Services Architecture and Applications (IMSAA
, 2008
"... Abstract—The IP Multimedia Subsystem (IMS) framework uses Session Initiation Protocol (SIP) for signaling and control of sessions. In this paper, we first demonstrate that SIP flooding attacks on IMS can result in denial of service to the legitimate users. Afterwards, we report our comparative study ..."
Abstract
-
Cited by 4 (0 self)
- Add to MetaCart
study of three well-known anomaly detection algorithms, Adaptive threshold, Cumulative sum, and Hellinger distance) for detection of flood attacks in IMS. We evaluate the accuracy of the algorithms using a comprehensive traffic dataset that consists of varying benign and malicious traffic patterns. I.
An Efficient Parallel Anomaly Detection Algorithm Based on Hierarchical Clustering
"... Abstract—For the purpose of improving real time and profiles accuracy, a parallel anomaly detection algorithm based on hierarchical clustering has been proposed. Training and predicting are two busiest processes and they are parallel designed and implemented. Moreover, an abnormal cluster feature tr ..."
Abstract
- Add to MetaCart
Abstract—For the purpose of improving real time and profiles accuracy, a parallel anomaly detection algorithm based on hierarchical clustering has been proposed. Training and predicting are two busiest processes and they are parallel designed and implemented. Moreover, an abnormal cluster feature
Anomaly Detection Algorithm Test Bench for Mobile Network Management
"... Huge amounts of operation data are constantly collected from the performance monitoring and system logs from servers in communication networks. One of the key applications for system operators is to detect anomalies in the data. The anomalies may indicate various types of situations that need attent ..."
Abstract
-
Cited by 1 (0 self)
- Add to MetaCart
for testing anomaly detection algorithms in network management environment. We introduce a test bench implementation and illustrate its properties with two local anomaly detection methods. One is based on SOM (Self Organizing Map) and clustering. Another one is an extension to a basic clustering method
A FRAMEWORK FOR THE RAPID DEVELOPMENT OF ANOMALY DETECTION ALGORITHMS IN NETWORK INTRUSION DETECTION SYSTEMS
"... Most current Network Intrusion Detection Systems (NIDS) perform detection by matching traffic to a set of known signatures. These systems have well defined mechanisms for the rapid creation and deployment of new signatures. However, despite their support for anomaly detection, this is usually limite ..."
Abstract
- Add to MetaCart
limited and often requires a full recompilation of the system to deploy new algorithms. As a result, anomaly detection algorithms are time consuming, difficult and cumbersome to develop. This paper presents an alternative system which permits the deployment of anomaly detection algorithms without the need
Results 1 - 10
of
51,779