Filters








36,625 Hits in 3.5 sec

A survey of network anomaly visualization

Tianye Zhang, Xumeng Wang, Zongzhuang Li, Fangzhou Guo, Yuxin Ma, Wei Chen
2017 Science China Information Sciences  
This paper surveys current progress and trends in network anomaly visualization.  ...  A number of intelligent visual tools are developed to enhance the ability of network security analysts in understanding the original data, ultimately solving network security problems.  ...  Conflict of interest The authors declare that they have no conflict of interest.  ... 
doi:10.1007/s11432-016-0428-2 fatcat:ss7es6m4czbtpov5la7ta46m4y

F/Wvis: Hierarchical Visual Approach for Effective Optimization of Firewall Policy

Taeyong Kim, Taewoong Kwon, Jun Lee, Jungsuk Song
2021 IEEE Access  
In this paper, we propose a novel hierarchical visual approach to optimizing the ACL of firewall on large-scale networks.  ...  which lead to network problems, and tools for management of the access policy bringing together a visualization method.  ...  His research interests include network security, artificial intelligence, data visualization, and security-related technologies.  ... 
doi:10.1109/access.2021.3100141 fatcat:x7pteeytkjg7beoxf5rxnsfwgm

Visual Anomaly Detection for Images: A Survey [article]

Jie Yang, Ruijie Xu, Zhiquan Qi, Yong Shi
2021 arXiv   pre-print
In this paper, we provide a comprehensive survey of the classical and deep learning-based approaches for visual anomaly detection in the literature.  ...  Especially in recent years, the development of deep learning has sparked an increasing interest in the visual anomaly detection problem and brought a great variety of novel methods.  ...  CONCLUSION In this survey paper, we have discussed various visual anomaly detection approaches.  ... 
arXiv:2109.13157v1 fatcat:zzut43xetng7tg3cghz25sjzoq

Data presentation in security operations centres: exploring the potential for sonification to enhance existing practice

Louise Axon, Bushra A AlAhmadi, Jason R C Nurse, Michael Goldsmith, Sadie Creese
2020 Journal of Cybersecurity  
We report on the results of a study consisting of an online survey (N = 20) and interviews (N = 21) with security practitioners working in a range of different SOCs.  ...  In recent years, advances have been made in the development of visual approaches to data presentation, with some uptake of advanced security visualization tools in SOCs.  ...  A number of participants felt that humans were capable of detecting anomalies when presented with network data.  ... 
doi:10.1093/cybsec/tyaa004 dblp:journals/cybersecurity/AxonANGC20 fatcat:4hkaq6o6pzefzliu3pizbfi7b4

A Survey of Visual Sensory Anomaly Detection [article]

Xi Jiang, Guoyang Xie, Jinbao Wang, Yong Liu, Chengjie Wang, Feng Zheng, Yaochu Jin
2022 arXiv   pre-print
In this survey, we are the first one to provide a comprehensive review of visual sensory AD and category into three levels according to the form of anomalies.  ...  Compared with semantic anomaly detection which detects anomaly at the label level (semantic shift), visual sensory AD detects the abnormal part of the sample (covariate shift).  ...  Scope of this Survey In this survey, we try to categorize different researches based on the kinds of anomalies in recent years.  ... 
arXiv:2202.07006v1 fatcat:2bqzmmrnjzggti5tcewa3mh3sa

Identifying Network Anomalies Using Clustering Technique in Weblog Data

Kiran Bejjanki, A. Bhaskar
2003 INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY  
Various clustering techniques can be used to identifydifferent anomalies in the network.  ...  Here, we present a newapproach based on simple K-Means for analyzing networkflow data using different attributes like IP address, Protocol,Port number etc. to detect anomalies.  ...  Conti et. a1 [4] provided a survey of packet and alert visualization techniques and present the challenges involved in information visualization of security related data and present techniques for network  ... 
doi:10.24297/ijct.v2i3a.2675 fatcat:iir52cu3arg2nk3hongefhramm

Anomaly Detection in Road Traffic Using Visual Surveillance: A Survey [article]

Santhosh Kelathodi Kumaran, Debi Prosad Dogra, Partha Pratim Roy
2019 arXiv   pre-print
In this paper, we present a survey on relevant visual surveillance related researches for anomaly detection in public places, focusing primarily on roads.  ...  Since the underlying building block of a typical anomaly detection is learning, we emphasize more on learning methods applied on video scenes.  ...  Fig. 2 . 2 Visual snapshots of some of the state-of-art anomaly detection techniques to present an overview about the survey.  ... 
arXiv:1901.08292v1 fatcat:qehtkb2imfbmpfahkgsjrx7544

Anomalous Activity Detection in Videos Using Increment Learning

Prerna Didwania, Vandana Jagtap
2020 European Journal of Engineering Research and Science  
This paper contains a survey of different approaches used for anomaly detection in the past.  ...  Nowadays, there is a rapid growth in the number of video cameras at public and private sector because of the monitoring and security purposes.  ...  Incremental and transfer learning approaches Ling Shao et al., 2015 [13] , performed a survey on visual categorization which uses transfer learning approach.  ... 
doi:10.24018/ejers.2020.5.3.1803 fatcat:jwltqrufobgpdb5cgzxpkovczy

Cloud-Based Monitoring of Thermal Anomalies in Industrial Environments Using AI and the Internet of Robotic Things

Mohammed Ghazal, Tasnim Basmaji, Maha Yaghi, Mohammad Alkhedher, Mohamed Mahmoud, Ayman S. El-Baz
2020 Sensors  
We also propose a self-driving deep learning architecture and a thermal anomalies detection and visualization algorithm.  ...  Our self-driving architecture has a root mean square error of 0.19 comparable to VGG-19 with a significantly reduced complexity and three times the frame rate at 60 frames per second.  ...  Conflicts of Interest: The authors declare no conflict of interest.  ... 
doi:10.3390/s20216348 pmid:33171714 fatcat:rycdhzhvgfh7vnivmk56vqvj5m

Sonification in security operations centres: what do security practitioners think? [article]

Louise M. Axon and Bushra Alahmadi and Jason R. C. Nurse and Michael Goldsmith and Sadie Creese
2018 arXiv   pre-print
We report on the results of a study consisting of an online survey (N=20) and interviews (N=21) with security practitioners working in a range of different SOCs.  ...  In Security Operations Centres (SOCs) security practitioners work using a range of tools to detect and mitigate malicious computer-network activity.  ...  A number of participants felt that humans were capable of detecting anomalies when presented with network data.  ... 
arXiv:1807.06706v1 fatcat:aaf6xvdjgjh73apvmductvs5te

A Survey on Unsupervised Industrial Anomaly Detection Algorithms [article]

Yajie Cui, Zhaoxiang Liu, Shiguo Lian
2022 arXiv   pre-print
In this survey, we summarize current challenges and provide a thorough overview of recently proposed unsupervised algorithms for visual anomaly detection covering five categories, whose innovation points  ...  In contrast, recent research shows that unsupervised learning has great potential in tackling above disadvantages for visual anomaly detection.  ...  We hope to assist academics in better understanding the common principles of visual anomaly detection systems and identifying interesting research directions in this area.  ... 
arXiv:2204.11161v2 fatcat:hivfp55jn5dc3ahgitlkpyq4te

A survey of network flow applications

Bingdong Li, Jeff Springer, George Bebis, Mehmet Hadi Gunes
2013 Journal of Network and Computer Applications  
In this survey, we have reviewed an extensive number of studies with emphasis on network flow applications. First, we provide a brief introduction to sFlow, NetFlow and network traffic analysis.  ...  We provide a critique of the studies surveyed about datasets, perspectives, methodologies, challenges, future directions and ideas for potential integration with other Information Technology infrastructure  ...  George Bebis is a Visiting Professor in the Department of Computer Science at King Saud University (KSU), Riyadh, Saudi Arabia.  ... 
doi:10.1016/j.jnca.2012.12.020 fatcat:vn3hxplegbeg5lnyqmb5utvulu

Network attacks: Taxonomy, tools and systems

N. Hoque, Monowar H. Bhuyan, R.C. Baishya, D.K. Bhattacharyya, J.K. Kalita
2014 Journal of Network and Computer Applications  
In this survey, we provide a taxonomy of attack tools in a consistent way for the benefit of network security researchers.  ...  This paper also presents a comprehensive and structured survey of existing tools and systems that can support both attackers and network defenders.  ...  Our survey also includes a comparison of tools with parameters that are useful to the network traffic analyzer. (b) A survey of network forensic analysis methods is reported in Pilli et al. (2010) .  ... 
doi:10.1016/j.jnca.2013.08.001 fatcat:gfvxtbbki5c7xis2wjaj37izsm

ARTEMiS (Automated Robotic Terrestrial Exoplanet Microlensing Search) – Hunting for planets of Earth mass and below

Martin Dominik, Keith Horne, Alasdair Allan, Nicholas J. Rattenbury, Yiannis Tsapras, Colin Snodgrass, Michael F. Bode, Martin J. Burgdorf, Stephen N. Fraser, Eamonn Kerins, Christopher J. Mottram, Iain A. Steele (+3 others)
2007 Proceedings of the International Astronomical Union  
From 2008, ARTEMiS will provide an expert system that allows to adopt a three-step strategy of survey, follow-up and anomaly monitoring of gravitational microlensing events that is capable of detecting  ...  The SIGNALMEN anomaly detector, an integral part, has already demonstrated its performance during a pilot season.  ...  In contrast, a network of either 2m or 4 × 1m telescopes at each site, of which RoboNet-1.0 is a prototype, is well-suited to make full use of the capabilities of current surveys.  ... 
doi:10.1017/s1743921308016335 fatcat:fibb2mkm4bf4nhrtlwak2ujd54

Combining Exploratory Analysis and Automated Analysis for Anomaly Detection in Real-Time Data Streams

Ahmed Shah, Ibrahim Abualhaol, Mahmoud Gad, Michael Weiss
2017 Technology Innovation Management Review  
Indicators and detection techniques In a survey of anomaly detection techniques for BGP data, Al-Musawi (2015) identified key indicators that can be used to detect BGP attacks.  ...  The visual dashboard contains three main sections: Combining Exploratory Analysis and Automated Analysis for Anomaly Detection Visualization (exploration) A.  ... 
doi:10.22215/timreview/1068 fatcat:aqyig5ngijcjhal5udjjvgym6a
« Previous Showing results 1 — 15 out of 36,625 results