A hybrid approach to detect DDoS attacks using KOAD and the Mahalanobis distance

S Daneshgadeh, T Kemmerich… - 2018 IEEE 17th …, 2018 - ieeexplore.ieee.org
Distributed Denial of Service (DDoS) attacks continue to adversely affect internet-based
services and applications. Various approaches have been proposed to detect different types …

Entropy-based robust PCA for communication network anomaly detection

D Liu, CH Lung, N Seddigh… - 2014 IEEE/CIC …, 2014 - ieeexplore.ieee.org
Principal component analysis (PCA) has received increasing attention as a method to
distinguish network traffic anomalies from normal data instances based on its orthogonal …

A Bayesian parametric statistical anomaly detection method for finding trends and patterns in criminal behavior

A Holst, B Bjurling - 2013 European Intelligence and Security …, 2013 - ieeexplore.ieee.org
In this paper we describe how Bayesian Principal Anomaly Detection (BPAD) can be used
for detecting long and short term trends and anomalies in geographically tagged alarm data …

Anomaly clustering based on correspondence analysis

H Islam, T Ahmed - 2018 IEEE 32nd International Conference …, 2018 - ieeexplore.ieee.org
Traffic patterns in backbone IP networks often deviate from the norm, to lead to events
commonly termed as anomalies. Different algorithms have been proposed in literature to …

Automated system-level anomaly detection and classification using modified random forest

NK Gyamfi, D Ceponis… - 2022 1st International …, 2022 - ieeexplore.ieee.org
It is imperative for Internet-based services to monitor service performance closely and detect
anomalies as soon as possible. Despite this, deploying anomaly detectors to a particular …

Two-Tier Anomaly Detection for an Internet of Things Network

S Narayanan, S Uludag - 2023 IEEE 20th Consumer …, 2023 - ieeexplore.ieee.org
Machine Learning (ML) has proven itself to be one of the most powerful tools to detect and
prevent cyber-attacks. In this study, ML is used for anomaly detection in an Internet of Things …

[PDF][PDF] Intruder detection in camera networks using the one-class neighbor machine

T Ahmed, X Wei, S Ahmed… - … (ATSMA) Networking and …, 2011 - academia.edu
We propose a new algorithm based on machine learning techniques for automatic intruder
detection in surveillance networ s. The algorithm is theoretically founded on the concept of …

Learning algorithms for anomaly detection from images

T Ahmed, ASK Pathan, SS Ahmed - … Concepts, Methodologies, Tools …, 2017 - igi-global.com
Visual surveillance networks are installed in many sensitive places in the present world.
Human security officers are required to continuously stare at large numbers of monitors …

[PDF][PDF] Recurent neural network as a tool for parameter anomaly detection in thermal power plant

A Hajdarevic, L Banjanovic-Mehmedovic… - … Journal of Scientific …, 2015 - researchgate.net
Anomaly detection refers to the problem of finding patterns in data that do not conform to
expected behavior. It is very important to timely detect parameter anomalies in real-world …

[图书][B] Privacy-preserving collaborative anomaly detection

HA Ringberg - 2009 - search.proquest.com
Unwanted traffic is a major concern in the Internet today. Unwanted traffic includes Denial of
Service attacks, worms, and spam. Identifying and mitigating unwanted traffic costs …