S Harada, R Kawahara, T Mori… - … 2008-2008 IEEE …, 2008 - ieeexplore.ieee.org
We present a method of detecting network anomalies, such as DDoS (distributed denial of service) attacks and flash crowds, automatically in real time. We evaluated this method using …
Sequential detection (and isolation) of unusual and significant changes in network Origin- Destination (OD) traffic volumes from simple link load measurements is considered in the …
Optimal detection of unusual and significant changes in network Origin-Destination (OD) traffic volumes from simple link load measurements is considered in the paper. The ambient …
R Kawahara, N Kamiyama, S Harada… - … 2008-2008 IEEE …, 2008 - ieeexplore.ieee.org
We propose a method of identifying anomalous traffic sources using flow statistics. We have investigated a way of detecting whether or not anomalies occur by observing the behavior of …
Novelty detection, the identification of data that is unusual or different in some way, is relevant in a wide number of real-world scenarios, ranging from identifying unusual weather …