Filters








33,791 Hits in 3.8 sec

An Extensible and Flexible System for Network Anomaly Detection [chapter]

Thomas Gamer, Marcus Schöller, Roland Bless
2006 Lecture Notes in Computer Science  
Our proposed detection system uses programmable network technology to deploy such a system within the network itself.  ...  In this paper we introduce our system which can detect DDoS attacks, worm propagations, and wormhole attacks.  ...  Summary In this paper we presented a system for network anomaly detection which is hierarchical, anomaly-based, extensible and flexible.  ... 
doi:10.1007/11880905_9 fatcat:ykr5uovpwfeqlbhg3gibk62yja

Flexible WSNs Aims Easy Installation With Noise Reduce Method For Elderly People Care

Takanobu Otsuka, Takayuki Ito
2013 International Journal of Networked and Distributed Computing (IJNDC)  
Much research has been conducted on anomaly detection by wireless sensor networks (WSNs).  ...  Our experimental results show that our method is effective in increasing the inference accuracy for detecting anomaly data.  ...  Acknowledgements This work is partially supported by the Funding Program for Next GenerationWorld-Leading Researchers (NEXT Program) of the Japan Cabinet Office.  ... 
doi:10.2991/ijndc.2013.1.3.6 fatcat:2gqlcaksh5cxhomxcv4w5qgu2m

A System Architecture for Real-time Anomaly Detection in Large-scale NFV Systems

Anton Gulenko, Marcel Wallschläger, Florian Schmidt, Odej Kao, Feng Liu
2016 Procedia Computer Science  
This paper presents a set of methods and an implemented prototype for anomaly detection in cloud-based infrastructures with specific focus on the deployment of virtualized network functions.  ...  They require sophisticated methods and mechanisms for fast detection and recovery of failures.  ...  Figure 2 : 2 System architecture for anomaly detection in an NFV system  ... 
doi:10.1016/j.procs.2016.08.076 fatcat:aw7k45whkrb3hpdnouyhoijqne

Using Extensible Metadata Definitions to Create a Vendor-Independent SIEM System [chapter]

Kai-Oliver Detken, Dirk Scheuermann, Bastian Hellmann
2015 Lecture Notes in Computer Science  
For the realization two different extensions are discussed in this paper: a new feature model or an additional service identifier.  ...  This protocol is very useful for network security applications and for the correlation of different metadata in one common database.  ...  [9] and SIMU [1] for their great collaboration.  ... 
doi:10.1007/978-3-319-20472-7_48 fatcat:hasi2xjca5a37no7ax5dsoiudy

Deep Recurrent Neural Network for Intrusion Detection in SDN-based Networks

Tuan A Tang, Lotfi Mhamdi, Des McLernon, Syed Ali Raza Zaidi, Mounir Ghogho
2018 2018 4th IEEE Conference on Network Softwarization and Workshops (NetSoft)  
Consequently, in this paper, we propose a Gated Recurrent Unit Recurrent Neural Network (GRU-RNN) enabled intrusion detection systems for SDNs.  ...  Through extensive experiments, we conclude that the proposed approach exhibits a strong potential for intrusion detection in the SDN environments.  ...  An intrusion detection system (IDS) is one of the most important network security tools. The Anomaly-based IDS tries to identify observations that deviates from a baseline model.  ... 
doi:10.1109/netsoft.2018.8460090 dblp:conf/netsoft/TangMMZG18 fatcat:ulzayccfjfd6xbzdp3ze23swka

On-line Transformer Condition Monitoring through Diagnostics and Anomaly Detection

V. M. Catterson, S. E. Rudd, S. D. J. McArthur, G. Moss
2009 2009 15th International Conference on Intelligent System Applications to Power Systems  
This paper describes the end-to-end components of an on-line system for diagnostics and anomaly detection.  ...  The paper discusses the requirements on a system for interpreting data from the sensors installed on site, as well as describing the operation of specific diagnostic and anomaly detection techniques employed  ...  ACKNOWLEDGEMENT This work is funded through the EPSRC Supergen V, UK Energy Infrastructure (AMPerES) grant in collaboration with UK electricity network operators working under Ofgem's Innovation Funding  ... 
doi:10.1109/isap.2009.5352860 fatcat:ymj7xroy7jbrxpcvny7eqtymeq

Detecting an Anomaly Behavior through Enhancing the Mechanism of Packet Filtering

Mohammed Nazeh Abdul Wahid, Azizol Abdullah
2015 Journal of Computer Science  
The fundamental task of the Network Traffic Analysis is the ability of capturing and monitoring all the network traffics (incoming and outgoing) for local area network LAN and how the network analyzer  ...  is able to analyze and detect errors or any type of suspicious activities such as intruders.  ...  Ethics The author is responsible for all the materials and the methodology involved in this publication and it is a copyright of journal of computer science.  ... 
doi:10.3844/jcssp.2015.784.793 fatcat:rpluuxts5rau5ldrpkuytkkrd4

Process Aware Host-based Intrusion Detection Model

Hanieh Jalali, Ahmad Baraani
2012 International Journal of Communication Networks and Information Security  
The proposed model uses both anomaly detection and misuse detection techniques for more efficiency, and organizational perspective of process mining is considered (rather than controlflow perspective)  ...  The model is automated and can deal with large logs and is suitable for flexible application domains. The PAHID model is implemented by the use of ProM framework and Java programming.  ...  For constructing this reference model, an extensive training set (log) of normal behavior of the system and users is needed.  ... 
dblp:journals/ijcnis/JalaliB12 fatcat:4jibe6sf2ned5a6zqzj2xsuiim

Signal Processing Applications in Network Intrusion Detection Systems

Chin-Tser Huang, Rocky K.C. Chang, Polly Huang
2009 EURASIP Journal on Advances in Signal Processing  
In the paper "An adaptive approach to granular real-time anomaly detection," coauthored by Chin-Tser Huang and Jeff Janies, the authors propose a framework allowing flexible granular examination of network  ...  Given the diversity of Internet use today, with heterogeneous applications and usage, an everyday norm of Internet access for one host might be anomaly for others. Such observation  ...  They hope that readers will find this collection of papers interesting, instructive, and inspiring for further research on applying signal processing methods to the problem of detecting network intrusions  ... 
doi:10.1155/2009/527689 fatcat:iaieqhrzbvgd5fwu2uqvftdsa4

Anomaly Extraction and Mitigation using Efficient-Web Miner Algorithm

Gargi Joshi, A. K. Bongale
2014 International Journal of Computer Applications  
System makes an effort to mitigate the anomaly so detected without human intervention.  ...  significantly reduces the time needed for analyzing alarms, making anomaly detection systems more practical, simple and realistic.  ...  An anomaly detection system provides meta-data relevant to narrow down the set of candidate anomalous flows.  ... 
doi:10.5120/17495-8024 fatcat:sxoegbt57jarvagclg6ncjhx7i

Decentralized trust management and accountability in federated systems

B.N. Chun, A. Bavier
2004 37th Annual Hawaii International Conference on System Sciences, 2004. Proceedings of the  
In this paper, we describe three key problems for trust management in federated systems and present a layered architecture for addressing them.  ...  The three problems we address include how to express and verify trust in a flexible and scalable manner, how to monitor the use of trust relationships over time, and how to manage and reevaluate trust  ...  For example, if the anomaly detection layer detects that an application is performing systematic portscans on a target network, the actions associated with this detection could be filtering of all external  ... 
doi:10.1109/hicss.2004.1265656 dblp:conf/hicss/ChunB04 fatcat:g3szavjphfhlpehrm56sddp6bu

Anomaly Detection in Business Process Runtime Behavior -- Challenges and Limitations [article]

Kristof Böhmer, Stefanie Rinderle-Ma
2017 arXiv   pre-print
Anomaly detection is generally acknowledged as an important problem that has already drawn attention to various domains and research areas, such as, network security.  ...  This work aims to foster the understanding and development of the process anomaly detection domain.  ...  Hence, process anomaly detection approaches must be defined in a flexible and extensible way to support various forms of runtime/execution behavior.  ... 
arXiv:1705.06659v1 fatcat:s5kskpekc5appkxdffygn73zti

Security of Information and Networks

Iftikhar Ahmad, Aneel Rahim, Adeel Javed, Hafiz Malik
2015 The Scientific World Journal  
., worked on the paper "Network Anomaly Detection System with Optimized DS Evidence Theory" in which a novel network anomaly detection system is proposed with Optimized Dempster-Shafer (ODS) evidence theory  ...  They proved that this network anomaly detection model has a better detection rate, and RBPA and ODS optimization methods can improve system performance significantly. A.  ...  They proved that this network anomaly detection model has a better detection rate, and RBPA and ODS optimization methods can improve system performance significantly. A.  ... 
doi:10.1155/2015/150640 pmid:26065013 pmcid:PMC4434210 fatcat:ftvhq7hwtvgqxgk3wbwnr5aidq

Anomaly-based network intrusion detection: Techniques, systems and challenges

P. García-Teodoro, J. Díaz-Verdejo, G. Maciá-Fernández, E. Vázquez
2009 Computers & security  
Threat Intrusion detection Anomaly detection IDS systems and platforms Assessment a b s t r a c t The Internet and computer networks are exposed to an increasing number of security threats.  ...  In this context, anomaly-based network intrusion detection techniques are a valuable technology to protect target systems and networks against malicious activities.  ...  Acknowledgments This work was partially supported by the European CELTIC RED project (CP3-011), by the Spanish Ministry of Industry, Tourism, and Commerce, and by the Spanish project TSI2005-08145-C02-  ... 
doi:10.1016/j.cose.2008.08.003 fatcat:sm4ygjfx4rdvxmjmoqhmkc2ecm

POSTER: Signal anomaly based attack detection in wireless sensor networks

Jeton Bacaj, Leon Reznik
2013 Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security - CCS '13  
For the attack detection implementation the study employed WSN built from Sun kits available on the market and extended Sensor Network Anomaly Detection System (SNADS) framework of methods and tools.  ...  This paper presents a feasibility study of novel attack detection mechanisms in wireless sensor networks (WSN) based on detecting anomalies and changes in sensor signals and data values.  ...  The developed methods are implemented as an extension to the Sensor Network Anomaly Detection System (SNADS) [9]-see Figure 1 for further details.  ... 
doi:10.1145/2508859.2512508 dblp:conf/ccs/BacajR13 fatcat:3zygzi4adfgofaexpifjefoq4u
« Previous Showing results 1 — 15 out of 33,791 results