Filters








1,565 Hits in 3.8 sec

Security Analysis of Online Centroid Anomaly Detection [article]

Marius Kloft, Pavel Laskov
<span title="2010-02-27">2010</span> <i > arXiv </i> &nbsp; <span class="release-stage" >pre-print</span>
In this contribution we analyze the performance of a particular method -- online centroid anomaly detection -- in the presence of adversarial noise.  ...  Our analysis addresses the following security-related issues: formalization of learning and attack processes, derivation of an optimal attack, analysis of its efficiency and constraints.  ...  the European Community, under the PASCAL2 Network of Excellence, ICT-216886.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/1003.0078v1">arXiv:1003.0078v1</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/jppd77ms3fhwja5c5fgjhkygmu">fatcat:jppd77ms3fhwja5c5fgjhkygmu</a> </span>
<a target="_blank" rel="noopener" href="https://archive.org/download/arxiv-1003.0078/1003.0078.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> File Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/66/77/66773ecea49a061fd5dd6561e0e36afa8cae54ba.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/1003.0078v1" title="arxiv.org access"> <button class="ui compact blue labeled icon button serp-button"> <i class="file alternate outline icon"></i> arxiv.org </button> </a>

A framework for quantitative security analysis of machine learning

Pavel Laskov, Marius Kloft
<span title="">2009</span> <i title="ACM Press"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/rau5643b7ncwvh74y6p64hntle" style="color: black;">Proceedings of the 2nd ACM workshop on Security and artificial intelligence - AISec &#39;09</a> </i> &nbsp;
We exemplarily apply the framework for the analysis of one specific learning scenario, online centroid anomaly detection and experimentally verify the tightness of obtained theoretical bounds.  ...  We propose a framework for quantitative security analysis of machine learning methods.  ...  QUANTITATIVE ANALYSIS OF ON-LINE CENTROID ANOMALY DETEC-TION As an example of a practical application of the proposed framework, we outline the essential steps of a quantitative analysis of online centroid  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1145/1654988.1654990">doi:10.1145/1654988.1654990</a> <a target="_blank" rel="external noopener" href="https://dblp.org/rec/conf/ccs/LaskovK09.html">dblp:conf/ccs/LaskovK09</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/7x4khxai3vdbtojfuonzwr3j7a">fatcat:7x4khxai3vdbtojfuonzwr3j7a</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20170809130950/https://www2.informatik.hu-berlin.de/~kloftmar/publications/AISec24-laskov.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/23/47/23476deefc3ba9b96a0898b48b03cf7a61e54936.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1145/1654988.1654990"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> acm.org </button> </a>

Residential demand response behaviour modeling applied to cyber-physical intrusion detection

Kai Heussen, Emil Tyge, Anna Magdalena Kosek
<span title="">2017</span> <i title="IEEE"> 2017 IEEE Manchester PowerTech </i> &nbsp;
Finally, we propose an approach to apply this behaviour characterization to the identification of anomalous and potentially malicious behaviour modifications as part of a cyber-physical intrusion detection  ...  The time domain dynamic behaviour of individual residential demand responses is governed by a mix of physical system parameters, exogenous influences, user behaviour and preferences, which can be characterized  ...  both cyber-and physical anomaly and intrusion detection [2] .  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/ptc.2017.7981209">doi:10.1109/ptc.2017.7981209</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/lnvlpcshkvfm5ffq4iubcceiri">fatcat:lnvlpcshkvfm5ffq4iubcceiri</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20190227071320/https://core.ac.uk/download/pdf/84005224.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/1c/50/1c505aad5591253afaee3c28b2a14f6312df842d.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/ptc.2017.7981209"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> ieee.com </button> </a>

Anomaly Detection in Hospital Claims Using K-Means and Linear Regression

Hendri Kurniawan Prakosa, Nur Rokhman
<span title="2021-10-31">2021</span> <i title="Universitas Gadjah Mada"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/r2hl3iprnzhnxgrfcjtgqamnsi" style="color: black;">IJCCS (Indonesian Journal of Computing and Cybernetics Systems)</a> </i> &nbsp;
Fraud can be detected by looking at the anomalies that appear in the claim data.This research aims to determine the anomaly of hospital claim to BPJS Kesehatan.  ...  Based on that, there are 435 anomaly points out of 10,000 data or 4.35%. It is hoped that with the identification of these, more effective follow-up can be carried out.  ...  of the Health Insurance Program in the National Social Security System [3] .  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.22146/ijccs.68160">doi:10.22146/ijccs.68160</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/ycuuafsapbchxgkzke53ebri2q">fatcat:ycuuafsapbchxgkzke53ebri2q</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20220422203016/https://jurnal.ugm.ac.id/ijccs/article/download/68160/32409" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/2d/8a/2d8ad845b4128be85b128f76ba6ea5d74c66ec4b.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.22146/ijccs.68160"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> Publisher / doi.org </button> </a>

Analysis of Hybrid Intrusion Detection System Based on Data Mining Techniques
English

Prathibha K S, Pankaj Kumar, Shyni T S
<span title="2014-09-25">2014</span> <i title="Seventh Sense Research Group Journals"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/wczsapkvorbcbfmnmu4k6wonju" style="color: black;">International Journal of Engineering Trends and Technoloy</a> </i> &nbsp;
In the proposed hybrid framework, improves the detection rate by taking the advantages of misuse and anomaly detection.  ...  The rapid growth of network based activities makes computer security is a more crucial issue. Many security methods are developed and used, but they are unfit to detect novel intrusions.  ...  This work was supported by High Performance Computing Center of Fedaral Institute of Science And Technology(FISAT), Angamally.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.14445/22315381/ijett-v15p285">doi:10.14445/22315381/ijett-v15p285</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/rj3665n6zjdr5o3hem4p7sxrfm">fatcat:rj3665n6zjdr5o3hem4p7sxrfm</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20170922004654/http://ijettjournal.org/volume-15/number-9/IJETT-V15P285.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/cd/8d/cd8d40edddf3f23fad720648dbd17a19daf78630.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.14445/22315381/ijett-v15p285"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> Publisher / doi.org </button> </a>

Implementation of ML Algorithm's for Cyber Security

Mohammad Asif, Prof. E. M. Chirchi
<span title="2021-07-01">2021</span> <i title="Technoscience Academy"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/zondmso2kjfrzbdtowoynb6yoe" style="color: black;">International Journal of Scientific Research in Science and Technology</a> </i> &nbsp;
of identification and examination is a luring objective, the adequacy of machine learning in digital security must be assessed with the due steadiness.  ...  We present an examination, routed to security experts, of machine learning methods connected to the recognition of interruption, malware, and spam.  ...  We Analyses these techniques for three relevant cyber security problems: intrusion detection malware analysis and spam detection.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.32628/cseit217416">doi:10.32628/cseit217416</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/6ayyuqblnjb5rm7ksurmksejr4">fatcat:6ayyuqblnjb5rm7ksurmksejr4</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20210916133630/https://ijsrcseit.com/paper/CSEIT217416.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/af/bf/afbffa80b68106c8d7f922008b45c681fedc1e55.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.32628/cseit217416"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> Publisher / doi.org </button> </a>

WIDS

C. I. Ezeife, Maxwell Ejelike, A. K. Aggarwal
<span title="">2008</span> <i title="ACM Press"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/hjiolmjuyrc77lwhatq4lbag64" style="color: black;">Proceedings of the 2008 international symposium on Database engineering &amp; applications - IDEAS &#39;08</a> </i> &nbsp;
The proposed WIDS design approach involves real time pre-processing of sensor data using a density-based, Local Sparsity Coefficient (LSC) outlier detection algorithm to assign anomaly scores to the connection  ...  This paper proposes WIDS, a wireless intrusion detection system, which applies data mining clustering technique to wireless network data captured through hardware sensors for purposes of real time detection  ...  One possibility is to capture wired metrics (features) and include it in our anomaly analysis. 3.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1145/1451940.1451976">doi:10.1145/1451940.1451976</a> <a target="_blank" rel="external noopener" href="https://dblp.org/rec/conf/ideas/EzeifeEA08.html">dblp:conf/ideas/EzeifeEA08</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/px227xx3gnhmjg6rvzdry3rt6e">fatcat:px227xx3gnhmjg6rvzdry3rt6e</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20200321150110/http://cezeife.myweb.cs.uwindsor.ca/Cezeife_ideas08.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/b3/e2/b3e2171534e4711b769899eed1ce1012326cd25d.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1145/1451940.1451976"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> acm.org </button> </a>

Anomaly-based network IDS false alarm filter using cluster-based alarm classification approach

Qais Saif Qassim, Abdullah Mohd Zin, Mohd Juzaiddin Ab Aziz
<span title="">2017</span> <i title="Inderscience Publishers"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/ufkuamvrurhuddcxn3x7aza3uq" style="color: black;">International Journal of Security and Networks (IJSN)</a> </i> &nbsp;
Keywords: intrusion detection system; positive false alarm; alarm management; joint entropy; network security.  ...  Anomaly-based network intrusion detection systems (A-NIDS) are an important and essential defence mechanism against network attacks.  ...  In information theory, entropy is a measure of the uncertainty associated with a random variable, which is widely used to analyse data and detect anomalies in information security.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1504/ijsn.2017.081056">doi:10.1504/ijsn.2017.081056</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/gvgecypcyzcxzgifsad3ctc3bm">fatcat:gvgecypcyzcxzgifsad3ctc3bm</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20180603050210/http://www.inderscience.com/storage/f916122711810435.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/77/d8/77d8770d5d012f4ec14e4c5af08bcc563e9052d3.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1504/ijsn.2017.081056"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> Publisher / doi.org </button> </a>

Visualization of Influencing Nodes in Online Social Networks

Prajit Limsaiprom, Prasong Praneetpolgrang, Pilastpongs Subsermsri
<span title="2014-04-08">2014</span> <i title="MECS Publisher"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/rwj7spciv5a47gdqqkgtmu7xvm" style="color: black;">International Journal of Computer Network and Information Security</a> </i> &nbsp;
The methodology for information security analysis was proposed with the complementary of Cluster Algorithm and Social Network Analysis, which presented anomaly and cyber attack patterns in online social  ...  The new proposed information security analysis methodology and results were significance analysis and could be applied as a guide for further investigate of social network behavior to improve the security  ...  ACKNOWLEDGEMENTS I would like to thank National Research Council of Thailand (NRCT) for providing funding and material related to educational research.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.5815/ijcnis.2014.05.02">doi:10.5815/ijcnis.2014.05.02</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/7xgbor2li5gvrnbsynu633m37y">fatcat:7xgbor2li5gvrnbsynu633m37y</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20170814005751/http://www.mecs-press.org/ijcnis/ijcnis-v6-n5/IJCNIS-V6-N5-2.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/29/06/2906a35d993a9bcacc75dfc482da50275475a52a.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.5815/ijcnis.2014.05.02"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> Publisher / doi.org </button> </a>

Review of Anomaly Detection Based on Log Analysis

Xudong Wu
<span title="">2021</span> <i title="Exeley, Inc."> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/hjmnofjq3fccnjljb7y47mrni4" style="color: black;">International Journal of Advanced Network, Monitoring, and Controls</a> </i> &nbsp;
Therefore, log analysis has become an important means of anomaly detection.  ...  Based on log analysis, this paper consulted the related literature on anomaly detection, elaborated the research status of anomaly detection based on log analysis from the aspects of template matching,  ...  And online or offline analysis, which brings opportunities for log data anomaly detection. At the same time, issues such as security and privacy in the network have also emerged.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.21307/ijanmc-2020-036">doi:10.21307/ijanmc-2020-036</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/7w2m2uigfzehjikxq6bbbnfona">fatcat:7w2m2uigfzehjikxq6bbbnfona</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20210121030241/https://www.exeley.com/exeley/journals/international_journal_advanced_network_monitoring_controls/5/4/pdf/10.21307_ijanmc-2020-036.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/f6/36/f6369278d781bbe4534b3db3b5aec9257fa65a39.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.21307/ijanmc-2020-036"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> Publisher / doi.org </button> </a>

Detection of access to terror-related Web sites using an Advanced Terror Detection System (ATDS)

Yuval Elovici, Bracha Shapira, Mark Last, Omer Zaafrany, Menahem Friedman, Moti Schneider, Abraham Kandel
<span title="">2009</span> <i title="Wiley"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/irrfofzyh5dn5jykwm6u5zvb5e" style="color: black;">Journal of the American Society for Information Science and Technology</a> </i> &nbsp;
The Advanced Terrorist Detection System (ATDS), is aimed at tracking down online access to abnormal content, which may include terrorist-generated sites, by analyzing the content of information accessed  ...  An experimental version of ATDS was implemented and evaluated in a local network environment.The results suggest that when optimally tuned the system can reach high detection rates of up to 100% in case  ...  Online detection. ATDS should be able to detect online access to terrorist-related content.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1002/asi.21249">doi:10.1002/asi.21249</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/abh5k4vbgzcmhfd67gfodveadm">fatcat:abh5k4vbgzcmhfd67gfodveadm</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20130120172234/http://www.ise.bgu.ac.il:80/faculty/mlast/papers/Elovici2010.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/0d/c7/0dc70cb71c2454c465120f4c2b1d4853b6b6eb49.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1002/asi.21249"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> wiley.com </button> </a>

Clustering Analysis for the Management of Self-Monitoring Device Networks

Andres Quiroz, Manish Parashar, Nathan Gnanasambandam, Naveen Sharma
<span title="">2008</span> <i title="IEEE"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/5q3ptcrafzaofoy6lit2qdvbr4" style="color: black;">2008 International Conference on Autonomic Computing</a> </i> &nbsp;
anomaly detection algorithm.  ...  Specifically, the paper investigates the application of clustering analysis for detecting anomalies and trends in events generated during device operation, and presents a novel decentralized cluster and  ...  ACKNOWLEDGEMENTS The research presented in this paper is supported in part by National Science Foundation via grants numbers CNS 0305495, CNS 0426354, IIS 0430826 and ANI 0335244, and by Department of  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/icac.2008.30">doi:10.1109/icac.2008.30</a> <a target="_blank" rel="external noopener" href="https://dblp.org/rec/conf/icac/QuirozPGS08.html">dblp:conf/icac/QuirozPGS08</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/krywgdnhsjed3easivm7seif3y">fatcat:krywgdnhsjed3easivm7seif3y</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20170809104731/http://nsfcac.rutgers.edu/TASSL/Papers/ClusteringAnalysisManagementSelfMonitoring.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/a0/59/a059ef7ecc00fcdeb9a7abaf04167a5ec7b5aa3c.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/icac.2008.30"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> ieee.com </button> </a>

An Unsupervised Anomaly Detection Framework for Detecting Anomalies in Real Time through Network System's Log Files Analysis

Vannel Zeufack, Donghyun Kim, Daehee Seo, Ahyoung Lee
<span title="">2021</span> <i title="Elsevier BV"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/noadvklzanhkbgsgem26vpsamm" style="color: black;">High-Confidence Computing</a> </i> &nbsp;
In this work, we propose a fully unsupervised framework which can detect anomalies in real time. We test our framework on hdfs log files and successfully detect anomalies with an F-1 score of 83%.  ...  Research in log-based anomaly detection can be divided into two main categories: batch log-based anomaly detection and streaming log-based anomaly detection.  ...  Online anomaly detection systems Online or streaming anomaly detection systems perform anomaly detection in real time, as the events are recorded. Currently, these approaches use supervised learning.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1016/j.hcc.2021.100030">doi:10.1016/j.hcc.2021.100030</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/66f55cen7nfyjdw2ehkvmnp66a">fatcat:66f55cen7nfyjdw2ehkvmnp66a</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20210603124854/https://pdf.sciencedirectassets.com/779309/1-s2.0-S2667295221X00037/1-s2.0-S2667295221000209/main.pdf?X-Amz-Security-Token=IQoJb3JpZ2luX2VjEEQaCXVzLWVhc3QtMSJGMEQCICL9MGP7usnc8pQnx3GrGK%2F69k4eMEt8oB9TMJSKY3PdAiBPkdiL6QCa4OjpZrPmHSA9opseF%2BtR49uQ5W7QyVVpWCqDBAjt%2F%2F%2F%2F%2F%2F%2F%2F%2F%2F8BEAQaDDA1OTAwMzU0Njg2NSIMiVtDTYoxC2SBNHcWKtcDGg4V0pK9mddSbqzr8VYuMM%2FNDdb3N%2BUuTssFtc3INYo5YYad6xd2PVMixONy3rLbasR1esaz%2BBEAXUVrkZqVA7zdk%2FIOSTzF9PpdgQCjQbI9lfaaWdW3xkJs6cyml2US%2FBrqwTZfsqdyr8Sx7SZ6aGf7lnOa%2BeASnZ5MIUiwwP6kyzFigG7zDPrmHCc9PVOXvwBz9wNJwc6GkGBPYxzXEUl9DYsje2J%2BOGULjmwVVxMdwStaDQX%2F9wkUyzfWH5FIGLH9CzGZBafNdBN0a8urmsy2%2FsPWha%2FDDCqWWMUXqOcjpvSTeFYar9sOzwsyiegbvrO%2FUceMN20R3YYv3iyIA3GihcnwKRniFA7Ca8eL%2BpW4hQ8kJIIqUvs6x1kJ88E3MC%2FAnzDsq8zFgF56Ice0C9bZ1ag5C4Aarz%2F3eHCzIrWrCh6ugX0Zk4fJiWexc7WW1rkp81UM3%2FFn6c8vYJ2UoaxplTmcJxQV1yfBRA3K28jsAMMCzCFPae8f4T4ubnGceFWDKoT6DGRuakEjFGdzsFfyUYqHDBq6J%2BU4%2BOzMePhuelrYMd%2B5PfRlUsGlWBxGkMlAfRUC0l53NSxTgpzF5UaUjDqsIqrBxwdWcOL2sCRbwTzefPf8MIL54oUGOqYBqvNRLuZLG0%2B072liaU7skDBaLLnHqyUO8cNIaLmbgjIRCJodkZ7egnmDW9gtjCcmsP112q19yoHe6kNzPdSMAdDZ6abOMb77vEt1rtccvTXRJQsq5Eks7yp5Jkdwek60ZLYEbLiD%2FCmsti5A%2Fr45UcCwWy26sGJ9KwLW%2BmS6foOh1s07XJda987b7s2PqIZV%2FNjYHXeJFISK8GtrUoztmQ%2FMBN1hZQ%3D%3D&amp;X-Amz-Algorithm=AWS4-HMAC-SHA256&amp;X-Amz-Date=20210603T124849Z&amp;X-Amz-SignedHeaders=host&amp;X-Amz-Expires=300&amp;X-Amz-Credential=ASIAQ3PHCVTYTYIRAKNF%2F20210603%2Fus-east-1%2Fs3%2Faws4_request&amp;X-Amz-Signature=17abaf507d3d69e4b9c70b2b3ae25596eee0cf7fecff7b01719c8573122b9bd5&amp;hash=3e66a343d0f24f8937b05f0f839ad3a4dd38fe0c19a56807602ee416a2cdf5b9&amp;host=68042c943591013ac2b2430a89b270f6af2c76d8dfd086a07176afe7c76c2c61&amp;pii=S2667295221000209&amp;tid=spdf-d66dec46-2988-4f5c-9b38-6c7601816980&amp;sid=fbda00f35ba3e34c54496a05e361a19c4fdagxrqa&amp;type=client" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/af/39/af39618b4206d3fc888372ea1ae2846130c455c8.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1016/j.hcc.2021.100030"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> elsevier.com </button> </a>

An investigation of the hoeffding adaptive tree for the problem of network intrusion detection

Diego Guarnieri Correa, Fabricio Enembreck, Carlos N. Silla
<span title="">2017</span> <i title="IEEE"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/qm5nunzmyva4tfjekdcm34uvhq" style="color: black;">2017 International Joint Conference on Neural Networks (IJCNN)</a> </i> &nbsp;
The results of our model are compared with the results of static intrusion detection models using unsupervised machine learning techniques.  ...  Anomaly Intrusion Detection System is used to identify a new attack in the network by identifying the deviations in the network traffic patterns.  ...  In Anomaly based Intrusion Detection system plays important role in network traffic patterns are stored. Any deviation from the security of the computer networks.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/ijcnn.2017.7966369">doi:10.1109/ijcnn.2017.7966369</a> <a target="_blank" rel="external noopener" href="https://dblp.org/rec/conf/ijcnn/CorreaES17.html">dblp:conf/ijcnn/CorreaES17</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/m5fwhdvsdjhcfkaaym7aw6crkq">fatcat:m5fwhdvsdjhcfkaaym7aw6crkq</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20170811184705/http://idosi.org/wasj/wasj33(1)15/13.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/dd/99/dd99a1dcaa25533d0b8aa86c16961565c6704747.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/ijcnn.2017.7966369"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> ieee.com </button> </a>

Log Analysis Techniques using Clustering in Network Forensics [article]

Imam Riadi, Jazi Eko Istiyanto, Ahmad Ashari, Subanar
<span title="2013-06-29">2013</span> <i > arXiv </i> &nbsp; <span class="release-stage" >pre-print</span>
The process of identifying attacks that happened also needs the support of both hardware and software as well.  ...  the source and target of attacks that exist in the network.  ...  ACKNOWLEDGMENT The authors would like to thank Ahmad Dahlan University (http://www.uad.ac.id) that provides funding for the research, and the Department of Computer Science and Electronics Gadjah Mada  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/1307.0072v1">arXiv:1307.0072v1</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/blbkq6kqsjhfnnihjggyobtkfa">fatcat:blbkq6kqsjhfnnihjggyobtkfa</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20200902034905/https://arxiv.org/ftp/arxiv/papers/1307/1307.0072.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/dd/92/dd923a2f36680f685e1f893a0c7f5c4493aaa5ef.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/1307.0072v1" title="arxiv.org access"> <button class="ui compact blue labeled icon button serp-button"> <i class="file alternate outline icon"></i> arxiv.org </button> </a>
&laquo; Previous Showing results 1 &mdash; 15 out of 1,565 results