Network and service management encompasses a set of activities, methods, procedures, and tools, whose ultimate goal is to guarantee the proper functioning of a networked system …
Multivariate time series data can be found in many application domains. Examples include data from computer networks, healthcare, social networks, or financial markets. Often …
E Glatz, S Mavromatidis, B Ager, X Dimitropoulos - Computing, 2014 - Springer
Visualizing communication logs, like NetFlow records, is extremely useful for numerous tasks that need to analyze network traffic traces, like network planning, performance …
Operation technology networks, ie hard-and software used for monitoring and controlling physical/industrial processes, have been considered immune to cyber attacks for a long …
F Zhou, W Huang, Y Zhao, Y Shi… - … computer graphics and …, 2015 - ieeexplore.ieee.org
Entropy-based traffic metrics have received substantial attention in network traffic anomaly detection because entropy can provide fine-grained metrics of traffic distribution …
Y Shi, Y Liu, H Tong, J He, G Yan… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
With the pervasive use of information technologies, the increasing availability of data provides new opportunities for understanding user behaviors. Unearthing anomalies in user …
H Leung, S Chen - US Patent 8,868,474, 2014 - Google Patents
Technologies are presented for anomaly detection in a cloud environment using a sparsity measure. In some examples, cloud metric data may be gathered and processed into a …
SY Ji, BK Jeong, DH Jeong - International Journal of Information Security, 2021 - Springer
Designing innovative approaches to detect intrusive network activities is considered as one of the most significant research topics in network security. Various computational methods …
Monitoring network traffic and detecting anomalies are essential tasks that are carried out routinely by security analysts. The sheer volume of network requests often makes it difficult …