Unada: Unsupervised network anomaly detection using sub-space outliers ranking

P Casas, J Mazel, P Owezarski - … 2011: 10th International IFIP TC 6 …, 2011 - Springer
Current network monitoring systems rely strongly on signa-ture-based and supervised-
learning-based detection methods to hunt out network attacks and anomalies. Despite being …

Sub-space clustering and evidence accumulation for unsupervised network anomaly detection

J Mazel, P Casas, P Owezarski - … , TMA 2011, Vienna, Austria, April 27 …, 2011 - Springer
Network anomaly detection has been a hot research topic for many years. Most detection
systems proposed so far employ a supervised strategy to accomplish the task, using either …

Unsupervised network anomaly detection

J Mazel - 2011 - theses.hal.science
Anomaly detection has become a vital component of any network in today's Internet.
Ranging from non-malicious unexpected events such as flash-crowds and failures, to …

Sub-space clustering, inter-clustering results association & anomaly correlation for unsupervised network anomaly detection

J Mazel, P Casas, Y Labit… - 2011 7th international …, 2011 - ieeexplore.ieee.org
Network anomaly detection is a critical aspect of network management for instance for QoS,
security, etc. The continuous arising of new anomalies and attacks create a continuous …

Unsupervised network anomaly detection based on abnormality weights and subspace clustering

X Zhao, G Wang, Z Li - 2016 Sixth International Conference on …, 2016 - ieeexplore.ieee.org
Most traditional network anomalies and attacks detection systems tend to employ supervised
strategies, which require labeled training dataset that is arduous and expensive to obtain …

Online and scalable unsupervised network anomaly detection method

J Dromard, G Roudiere… - IEEE Transactions on …, 2016 - ieeexplore.ieee.org
Nowadays, network intrusion detectors mainly rely on knowledge databases to detect
suspicious traffic. These databases have to be continuously updated which requires …

Hunting attacks in the dark: clustering and correlation analysis for unsupervised anomaly detection

J Mazel, P Casas, R Fontugne… - … Journal of Network …, 2015 - Wiley Online Library
Network anomalies and attacks represent a serious challenge to ISPs, who need to cope
with an increasing number of unknown events that put their networks' integrity at risk. Most of …

[HTML][HTML] A local feature engineering strategy to improve network anomaly detection

S Carta, AS Podda, DR Recupero, R Saia - Future Internet, 2020 - mdpi.com
The dramatic increase in devices and services that has characterized modern societies in
recent decades, boosted by the exponential growth of ever faster network connections and …

Challenging the supremacy of traffic matrices in anomaly detection

A Soule, F Silveira, H Ringberg, C Diot - Proceedings of the 7th ACM …, 2007 - dl.acm.org
Multiple network-wide anomaly detection techniques proposed in the literature define an
anomaly as a statistical outlier in aggregated network traffic. The most popular way to …

Network anomaly detection based on late fusion of several machine learning algorithms

TH Hai, E nam Huh - International Journal of Computer …, 2020 - khu.elsevierpure.com
Today's Internet and enterprise networks are so popular as they can easily provide
multimedia and e-commerce services to millions of users over the Internet in our daily lives …