Accurate anomaly detection through parallelism

S Shanbhag, T Wolf - IEEE network, 2009 - ieeexplore.ieee.org
In this article we discuss the design and implementation of a real-time parallel anomaly
detection system. The key idea is to use multiple existing anomaly detection algorithms in …

Massively parallel anomaly detection in online network measurement

S Shanbhag, T Wolf - 2008 Proceedings of 17th International …, 2008 - ieeexplore.ieee.org
Detecting anomalies during the operation of a network is an important aspect of network
management and security. Recent development of high-performance embedded processing …

A-GHSOM: An adaptive growing hierarchical self organizing map for network anomaly detection

D Ippoliti, X Zhou - Journal of Parallel and Distributed Computing, 2012 - Elsevier
The growing hierarchical self organizing map (GHSOM) has been shown to be an effective
technique to facilitate anomaly detection. However, existing approaches based on GHSOM …

Survey on incremental approaches for network anomaly detection

MH Bhuyan, DK Bhattacharyya, JK Kalita - arXiv preprint arXiv:1211.4493, 2012 - arxiv.org
As the communication industry has connected distant corners of the globe using advances
in network technology, intruders or attackers have also increased attacks on networking …

Towards a multi‐layers anomaly detection framework for analyzing network traffic

B Li, S Zhang, K Li - Concurrency and computation: practice …, 2017 - Wiley Online Library
Anomaly detection plays a crucial part in identifying unforeseen attacks for network and
information security. However, the accuracy of existing network anomaly detection …

Designing an online and reliable statistical anomaly detection framework for dealing with large high-speed network traffic

N Moustafa - 2017 - unsworks.unsw.edu.au
Abstract Despite a Network Anomaly Detection System (NADS) being capable of detecting
existing and zero-day attacks, it is still not universally implemented in industry and real …

Anomaly extraction in backbone networks using association rules

D Brauckhoff, X Dimitropoulos, A Wagner… - Proceedings of the 9th …, 2009 - dl.acm.org
Anomaly extraction is an important problem essential to several applications ranging from
root cause analysis, to attack mitigation, and testing anomaly detectors. Anomaly extraction …

Unada: Unsupervised network anomaly detection using sub-space outliers ranking

P Casas, J Mazel, P Owezarski - … 2011: 10th International IFIP TC 6 …, 2011 - Springer
Current network monitoring systems rely strongly on signa-ture-based and supervised-
learning-based detection methods to hunt out network attacks and anomalies. Despite being …

Hunting attacks in the dark: clustering and correlation analysis for unsupervised anomaly detection

J Mazel, P Casas, R Fontugne… - … Journal of Network …, 2015 - Wiley Online Library
Network anomalies and attacks represent a serious challenge to ISPs, who need to cope
with an increasing number of unknown events that put their networks' integrity at risk. Most of …

ADE: an ensemble approach for early anomaly detection

TS Buda, H Assem, L Xu - 2017 IFIP/IEEE Symposium on …, 2017 - ieeexplore.ieee.org
Proactive anomaly detection refers to anticipating anomalies or abnormal patterns within a
dataset in a timely manner. Discovering anomalies such as failures or degradations before …