Anomaly detection of structural health monitoring data using the maximum likelihood estimation-based Bayesian dynamic linear model

YM Zhang, H Wang, HP Wan… - Structural Health …, 2021 - journals.sagepub.com
Enormous data are continuously collected by the structural health monitoring system of civil
infrastructures. The structural health monitoring data inevitably involve anomalies caused by …

Intrusion detection using continuous time Bayesian networks

J Xu, CR Shelton - Journal of Artificial Intelligence Research, 2010 - jair.org
Intrusion detection systems (IDSs) fall into two high-level categories: network-based systems
(NIDS) that monitor network behaviors, and host-based systems (HIDS) that monitor system …

Adaptive system anomaly prediction for large-scale hosting infrastructures

Y Tan, X Gu, H Wang - Proceedings of the 29th ACM SIGACT-SIGOPS …, 2010 - dl.acm.org
Large-scale hosting infrastructures require automatic system anomaly management to
achieve continuous system operation. In this paper, we present a novel adaptive runtime …

Abnormal human behavioral pattern detection in assisted living environments

K Park, Y Lin, V Metsis, Z Le, F Makedon - Proceedings of the 3rd …, 2010 - dl.acm.org
In recent years, there is a growing interest about assisted living environments especially for
the elderly who live alone, due to the increasing number of aged people. In order for them to …

On predictability of system anomalies in real world

Y Tan, X Gu - 2010 IEEE International Symposium on Modeling …, 2010 - ieeexplore.ieee.org
As computer systems become increasingly complex, system anomalies have become major
concerns in system management. In this paper, we present a comprehensive measurement …

Behavioral malware detection in delay tolerant networks

W Peng, F Li, X Zou, J Wu - IEEE Transactions on Parallel and …, 2013 - ieeexplore.ieee.org
The delay-tolerant-network (DTN) model is becoming a viable communication alternative to
the traditional infrastructural model for modern mobile consumer electronics equipped with …

Automated anomaly detector adaptation using adaptive threshold tuning

MQ Ali, E Al-Shaer, H Khan, SA Khayam - ACM Transactions on …, 2013 - dl.acm.org
Real-time network-and host-based Anomaly Detection Systems (ADSs) transform a
continuous stream of input data into meaningful and quantifiable anomaly scores. These …

Denial of service detection using dynamic time warping

DM Diab, B AsSadhan, H Binsalleeh… - … Journal of Network …, 2021 - Wiley Online Library
With the rapid growth of security threats in computer networks, the need for developing
efficient security‐warning systems is substantially increasing. Distributed denial‐of‐service …

[HTML][HTML] Improving intrusion detection model prediction by threshold adaptation

AM Al Tobi, I Duncan - Information, 2019 - mdpi.com
Network traffic exhibits a high level of variability over short periods of time. This variability
impacts negatively on the accuracy of anomaly-based network intrusion detection systems …

Continuous time Bayesian networks for host level network intrusion detection

J Xu, CR Shelton - Machine Learning and Knowledge Discovery in …, 2008 - Springer
We consider the problem of detecting host-level attacks in network traffic using unsupervised
learning. We model the normal behavior of a host's traffic from its signature logs, and flag …