T Ahmed, S Ahmed, S Ahmed… - 2010 IEEE International …, 2010 - ieeexplore.ieee.org
In this paper we apply a recursive algorithm based on kernel mappings to propose an automated, real-time intruder detection mechanism for surveillance networks. Our proposed …
In this chapter, we apply various machine learning techniques for classification of known network anomalies. The models are trained and tested on various collected datasets. With …
In this paper, we present MARK, a data synthesis method to synthesize patterns for evolving normal network behaviors as well as unknown network attacks for detection of an anomaly …
In the digital age, data are collected in unprecedented volumes on a plethora of networks. These data provide opportunities to develop our understanding of network processes by …
P Casas - 2018 Network Traffic Measurement and Analysis …, 2018 - ieeexplore.ieee.org
The application of Machine Learning (ML) models to the analysis of network measurement problems has largely increased in the last decade; however, there is still no clear best …
This paper proposes RAMAN, a framework of approaches for multimodal anomaly detection that is robust to different anomaly types, input data, and domain constraints for the Mars …
Fault detection in modern networks is done with a set of specially instrumented nodes which send probes to find faults. These probes generate additional traffic in network and compete …
T Ding, A AlEroud, G Karabatis - 2015 IEEE international …, 2015 - ieeexplore.ieee.org
Investigating network flows is an approach of detecting attacks by identifying known patterns. Flow statistics are used to discover anomalies by aggregating network traces and …
M Tiloca, A Stagkopoulou, G Dini - arXiv preprint arXiv:1609.04554, 2016 - arxiv.org
Software Defined Networking (SDN) has been recently introduced as a new communication paradigm in computer networks. By separating the control plane from the data plane and …