[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
Volume 20, Issue 5September 2010
Publisher:
  • John Wiley & Sons, Inc.
  • 605 Third Ave. New York, NY
  • United States
EISSN:1099-1190
Reflects downloads up to 12 Jan 2025Bibliometrics
Skip Table Of Content Section
article
Distribution-based anomaly detection in 3G mobile networks: from theory to practice

The design of anomaly detection (AD) methods for network traffic has been intensively investigated by the research community in recent years. However, less attention has been devoted to the issues which eventually arise when deploying such tools in a ...

article
A scalable, efficient and informative approach for anomaly-based intrusion detection systems: theory and practice

In this paper, we present the design and implementation of a new approach for anomaly detection and classification over high speed networks. The proposed approach is based first of all on a data reduction phase through flow sampling by focusing mainly ...

article
An evaluation of automatic parameter tuning of a statistics-based anomaly detection algorithm

We investigate an automatic and dynamic parameter tuning of a statistical method for detecting anomalies in network traffic (this tuning is referred to as parameter learning) towards real-time detection. The main idea behind the dynamic tuning is to ...

article
Unsupervised host behavior classification from connection patterns

A novel host behavior classification approach is proposed as a preliminary step toward traffic classification and anomaly detection in network communication. Although many attempts described in the literature were devoted to flow or application ...

article
Experiences of VoIP traffic monitoring in a commercial ISP

VoIP (Voice over IP) has widely been addressed as the technology that will change the telecommunication model, opening the path for convergence. Yet this revolution is far from being complete, since, as of today the majority of telephone calls are still ...

Comments

Please enable JavaScript to view thecomments powered by Disqus.