Anomaly Detection
4,216 Followers
Recent papers in Anomaly Detection
There is often the need to update an installed Intrusion Detection System (IDS) due to new attack methods or upgraded computing environments. Since many cur- rent IDSs are constructed by manual encoding of ex- pert security knowledge,... more
Dendritic Cells (DCs) are innate immune system cells which have the power to activate or suppress the immune system. The behaviour of human of human DCs is abstracted to form an algorithm suitable for anomaly detection. We test this... more
As computer systems continue to grow in scale and complexity, performance problems become common and a major concern for large-scale computing. Performance anomalies caused by application bugs, hardware or software faults, or resource... more
Abstract This paper advocates a problem-oriented approach for the design of artificial immune systems (AIS) for data mining. By problem-oriented approach we mean that, in real-world data mining applications the design of an AIS should... more
In this whitepaper we briey describe Masibty, a novel anomaly-based web application rewall we devised. It has a modular and extensible structure. We give an overview of the anomaly detection models we im- plemented in it, and show that it... more
In this paper we analyze the use of different types of statistical tests for the correlation of anomaly detection alerts. We show that the Granger Causality Test, one of the few proposals that can be extended to the anomaly detection... more
The construction and maintenance of a medical thesaurus is a non-trivial task, due to the inherent complexity of a proper medical terminology. We present a methodology for transaction-based anomaly detection in the process of thesaurus... more
The annual incidence of insider attacks continues to grow, and there are indications this trend will continue. While there are a number of existing tools that can accurately identify known attacks, these are reactive (as opposed to... more
Course Outline and summary of what has been and can be provided for special workshops, courses, and trainings. Pertaining heavily to the mathematics and computational modeling, and the applications thereof.
Anomaly detection is one of the major areas of research with the tremendous development of computer networks. Any intrusion detection model designed should have the ability to visualize high dimensional data with high processing and... more
Relational reasoning, which has been defined as the ability to discern meaningful patterns within any informational stream, is a foundational cognitive ability associated with education, including in scientific domains. This study... more
In binary classification there are two types of errors, and in many applications these may have very different costs. We consider two learning frameworks that address this issue: minimax classification, where we seek to minimize the... more
Attacks, such as port scans, DDoS and worms, threaten the functionality and reliability of IP networks. Early and accurate detection is crucial to mitigate their impact. We use the Method of Remaining Elements (MRE) to detect anomalies... more
Due to the increasing deployment of vehicles in human societies and the necessity for smart traffic control, anomaly detection is among the various tasks widely employed in traffic monitoring. As the issue of urban traffic and their... more
Uncertain data management, querying and mining have become important because the majority of real world data is accompanied with uncertainty these days. Uncertainty in data is often caused by the deficiency in underlying data collecting... more
... Japkowicz [6] used an autoencoder neural network to detect faults in gearboxes. ... Several types of neural networks have been proposed for novelty detection including Autoassociators [6 ... A control system was created using a... more
... Arshad Ali, Modood Ahmad Khan, S. Azam H. Bukhari and Waqar Mahmood1 drarshad@niit. edu.pk, 55Modood@niit.edu.pk, 55azam@niit.edu ... Cottrell, Connie Logg, Jiri Nivartili, William Jerrod of SLAC-Stanford, Ejaz Ahmed, Zaheer A. Khan,... more
Techniques for anomaly detection in the maritime domain are developed in this thesis using an area metric that measures the degree of similarity, or distinction, between ships’ tracks using the area between ships’ tracks. A modified... more
ABSTRACT Many approaches for anomaly detection use statistical based methods that build profiles of normality. In these cases, anomalies are defined as deviations from normal models build from representative data. Detection systems based... more
ABSTRACT The utilization of uniform eddy current techniques to detect anomalies in conductive plates represents an important issue. This article presents novel uniform eddy current probe architecture with a planar excitation coil and a... more
Smart meters have become a core part of the Internet of Things, and its sensory network is increasing globally. For example, in the UK there are over 15 million smart meters operating across homes and businesses. One of the main... more
【Abstract】Intrusion Detection System(IDS) has beenharassed by false positive and false negative problem. Common IDS using single detection mode is hard to solve this problem effectively. This paper analyzes the characteristics of network... more
The rapid progress of modern technologies generates a massive amount of highthroughput data, called Big Data, which provides opportunities to find new insights using machine learning (ML) algorithms. Big Data consist of many features... more