IoT-KEEPER: Detecting malicious IoT network activity using online traffic analysis at the edge

I Hafeez, M Antikainen, AY Ding… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
IoT devices are notoriously vulnerable even to trivial attacks and can be easily
compromised. In addition, resource constraints and heterogeneity of IoT devices make it …

User behavior profiling using ensemble approach for insider threat detection

M Singh, BM Mehtre… - 2019 IEEE 5th International …, 2019 - ieeexplore.ieee.org
The greatest threat towards securing the organization and its assets are no longer the
attackers attacking beyond the network walls of the organization but the insiders present …

ALSR: an adaptive label screening and relearning approach for interval-oriented anomaly detection

J Wang, Y Jing, Q Qi, T Feng, J Liao - Expert Systems with Applications, 2019 - Elsevier
Abstract Anomaly detection using KPIs (Key Performance Indicators) is a key part of AIOps
(Artificial Intelligence for IT Operations). Recent anomaly detection approaches have …

SFMD: A Semi-Supervised Federated Malicious Traffic Detection Approach in IoT

W Wang, S Wang, D Bai, C Zhao… - 2022 IEEE Intl Conf …, 2022 - ieeexplore.ieee.org
With the increasingly widespread application of Internet of Things (IoT), network attacks has
become a main threat of IoT devices' security. Due to the network traffic data is the carrier of …

[PDF][PDF] Anomaly Detection Using Time Series Forecasting with Deep Learning

T Mathonsi - 2022 - wiredspace.wits.ac.za
The main themes that this thesis focuses on are anomaly detection, time series forecasting,
uncertainty quantification of said point forecasts using prediction intervals, and …

Fdnn: Feature-based deep neural network model for anomaly detection of kpis

Z Lan, L Xu, W Fang - 2019 IEEE 10th International Conference …, 2019 - ieeexplore.ieee.org
Anomaly detection of KPIs (key performance indicators) has been widely applied to
guarantee systems stability in real world. KPIs include response time of Web pages, CPU …

Detecting and characterizing anomalous followers on social media

B Temel - 2022 - research.sabanciuniv.edu
This paper aims to detect anomalies in target social media accounts. Previous work on
behalf of this topic includes bot detection applications with different types of methods …

Comparison of LSTM and Transformer Neural Network on multiple approaches for weblogs attack detection

N Martínez Varsi - 2022 - redi.anii.org.uy
This work discusses and compares different approaches and neural networks for sequence
classification, in a context of attack detection in web services. The first approach to attack …

Spatiotemporal Anomaly Detection: Streaming Architecture and Algorithms

B Siegel - 2020 - search.proquest.com
Anomaly detection is the science of identifying one or more rare or unexplainable samples
or events in a dataset or data stream. The field of anomaly detection has been extensively …

[PDF][PDF] Trading Desk Behavior Modeling via LSTM for Rogue Trading Fraud Detection.

M Neyret, J Ouaggag, C Allain - DATA, 2020 - scitepress.org
Rogue trading is a term used to designate a fraudulent trading activity and rogue traders
refer to operators who take unauthorised positions with regard to the mandate of the desk to …