Adaptive anomaly detection in performance metric streams

O Ibidunmoye, AR Rezaie… - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
Continuous detection of performance anomalies such as service degradations has become
critical in cloud and Internet services due to impact on quality of service and end-user …

Fluxrank: A widely-deployable framework to automatically localizing root cause machines for software service failure mitigation

P Liu, Y Chen, X Nie, J Zhu, S Zhang… - 2019 IEEE 30th …, 2019 - ieeexplore.ieee.org
The failures of software service directly affect user experiences and service revenue. Thus
operators monitor both service-level KPIs (eg, response time) and machine-level KPIs (eg …

Rule-based anomaly detection on IP flows

N Duffield, P Haffner, B Krishnamurthy… - IEEE INFOCOM …, 2009 - ieeexplore.ieee.org
Rule-based packet classification is a powerful method for identifying traffic anomalies, with
network security as a key application area. While popular systems like Snort are used in …

Deep in the dark-deep learning-based malware traffic detection without expert knowledge

G Marín, P Casas… - 2019 IEEE Security and …, 2019 - ieeexplore.ieee.org
With the ever-growing occurrence of networking attacks, robust network security systems are
essential to prevent and mitigate their harming effects. In recent years, machine learning …

Anomaly detection approaches for communication networks

M Thottan, G Liu, C Ji - Algorithms for next generation networks, 2010 - Springer
In recent years, network anomaly detection has become an important area for both
commercial interests as well as academic research. Applications of anomaly detection …

Traffic prediction based on machine learning for elastic optical networks

M Aibin - Optical Switching and Networking, 2018 - Elsevier
The increased data transfers and rapidly evolving cloud services lead to the inevitable need
for the new techniques applied to communication networks, such as AI, machine learning …

Detecting anomalies in unmanned vehicles using the mahalanobis distance

R Lin, E Khalastchi, GA Kaminka - 2010 IEEE international …, 2010 - ieeexplore.ieee.org
The use of unmanned autonomous vehicles is becoming more and more significant in
recent years. The fact that the vehicles are unmanned (whether autonomous or not), can …

Servicerank: Root cause identification of anomaly in large-scale microservice architectures

M Ma, W Lin, D Pan, P Wang - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Nowadays, increasing business applications running in the cloud are embracing the
microservice architecture. This article presents the challenges and implications of …

Semi-supervised, Neural Network based approaches to face mask and anomaly detection in surveillance networks

S Saheel, A Alvi, AR Ani, T Ahmed, MF Uddin - Journal of Network and …, 2024 - Elsevier
In the post-pandemic world, surveillance cameras play a key aspect when it comes to
detecting various kinds of security risks. These can range from burglars entering a premises …

Machine learning for netflow anomaly detection with human-readable annotations

P Krishnamurthy, F Khorrami… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
We propose a framework for anomaly detection in communication network logs along with
automated extraction of human-readable annotations that explain the decision logic …