|
1
|
|
100%
|
|
Journal of Theoretical and Applied Computer Science
|
|
EN |
Presented paper evaluates method for detecting software anomalies based on recurrence plot analysis of trace log generated by software execution. Described method for detecting software anomalies is based on windowed recurrence quantification analysis for selected measures (e.g. Recurrence rate - RR[...]
|
|
|
2
|
|
100%
|
|
Image Processing & Communications
|
|
EN |
In this paper we present further expansion of our matching pursuit methodology for anomaly detection in computer networks. In our previous work we proposed new signal based algorithm for intrusion detection systems based on anomaly detection approach on the basis of the Matching Pursuit algorithm. T[...]
|
|
|
3
|
|
100%
|
|
Measurement Automation Monitoring
|
|
EN |
: In the paper, the authors present a method of anomalies detection and identification in network traffic using statistical signatures. There is also shown a new system architecture based on the Software-Defined Networking (SDN) which allows for application of statistical anomaly detection in compu[...]
|
|
|
4
|
|
100%
|
|
Image Processing & Communications
|
|
EN |
The article depicts possibility of using Matching Pursuit decomposition in order to recognize unspecified hazards in network traffic. Furthermore, the work aims to present feasible enhancements to the anomaly detection method, as well as their efficiency on the basis of a wide collection of pattern [...]
|
|
|
5
|
|
100%
|
|
Schedae Informaticae
|
|
EN |
In this article we present the use of sparse representation of a signal
and incoherent dictionary learning method for the purpose of network traffic
analysis. In learning process we use 1D INK-SVD algorithm to detect proper
dictionary structure. Anomaly detection is realized by parameter estimation
[...]
|
|
|
6
|
|
100%
|
|
Journal of Applied Computer Science Methods
|
|
EN |
In this paper we consider the problem of anomaly detection over time series metrics data took from one of corporate grade mail service cluster. We propose the algorithm based on one-sided median concept and present some results of experiments showing impact of parameters settings on algorithm perfor[...]
|
|
|
7
|
|
100%
|
|
Computer Science
|
|
EN |
Protection of infrastructures for e-science, including grid environments and NREN facilities, requires the use of novel techniques for anomaly detection and network monitoring. The aim is to raise situational awareness and provide early warning capabilities. The main operational problem that most ne[...]
|
|
|
8
|
|
100%
|
|
Studia i Materiały / Europejska Uczelnia Informatyczno-Ekonomiczna w Warszawie
|
|
PL |
W ramach projektu SECOR1 podjęto prace nad nowatorskimi metodami wykrywania anomalii w sieciach IP. Ostatnie badania wskazują, że odpowiednie do
tego celu jest wykorzystanie miar entropijnych. W artykule zaprezentowano wyniki
badań autorskiej detekcji anomalii bazującej na miarach entropijnych. Wyni[...]
|
EN |
The SECOR project goals include novel methods of anomalous traffic
detection in IP networks. Recently, entropy measures have shown significant promise in
detecting diverse set of network anomalies. While many different forms of entropy
exist, only a few have been studied in the context of network an[...]
|
|
|
9
|
|
88%
|
|
Journal of Telecommunications and Information Technology
|
|
EN |
In this paper, a framework for recognizing network traffic in order to detect anomalies is proposed. We propose to combine and correlate parameters from different layers in order to detect 0-day attacks and reduce false positives. Moreover, we propose to combine statistical and signal-based features[...]
|
|
|
10
|
|
88%
|
|
Image Processing & Communications
|
|
EN |
In our previous work innovative recognition algorithm applied to Anomaly Detection System has been presented. We proposed to use Matching Pursuit Mean Projection (MP-MP) of the reconstructed network signal to recognize anomalies in network traffic. In this paper we focus on evaluation of parameters [...]
|
|
|
11
|
|
88%
|
|
Annual of Navigation
|
|
PL |
Prezentowany artykuł omawia architekturę oprogramowania opracowanego na potrzeby projektu System for Intelligent Maritime Monitoring (SIMMO). System ten bazuje na najnowszych osiągnięciach w dziedzinach fuzji oraz inteligentnej analizy danych w celu generowania wzbogaconego obrazu sytuacji na morzu [...]
|
EN |
In this paper, we discuss a software architecture, which has been developed for the needs of the System for Intelligent Maritime Monitoring (SIMMO). The system bases on the state-of-the-art information fusion and intelligence analysis techniques, which generates an enhanced Recognized Maritime Pictu[...]
|
|
|
12
|
|
88%
|
|
Studia Informatica : systems and information technology
|
|
EN |
Anomaly detection methods are of common use in many fields, including databases and large computer systems. This article presents new algorithm based on negative feature selection, which can be used to find anomalies in real time. Proposed algorithm, called Negative Feature Selection algorithm (NegF[...]
|
|
|
13
|
|
88%
|
|
Geology, Geophysics and Environment
|
|
EN |
The assessment of flood embankments is a key component of a country’s comprehensive flood protection. Proper and early information on the possible instability of a flood embankment can make it possible to take preventative action. The assessment method proposed by the ISMOP project is based on a st[...]
|
|
|
14
|
|
88%
|
|
Fundamenta Informaticae
|
|
EN |
Cloud Collaboration Systems (CCS) offer efficient coordination among users to work on shared tasks in diverse distributed environments such as social networking, healthcare, wikis, and intelligent systems. Many cloud collaboration systems services are basically loosely coupled in nature. The flexibi[...]
|
|
|
15
|
|
75%
|
|
Metody Informatyki Stosowanej
|
|
PL |
Obecnie proponowany hybrydowy system wykrywania ataków robaków sieciowych, a wykorzystujący techniki eksploracji danych jest w fazie budowy. Jednak argumenty przedstawione w artykule pozwalają przypuszczać, że proponowany system wykaże się wysoką skutecznością i precyzją w wykrywaniu robaków interne[...]
|
EN |
Internet worms are a serious threat in today’s world. Most of conventional security systems do not protects users from zero-day worms which can cause many damage. This article presents the concept of data mining based worm detection hybrid system. It profiles the network traffic and detects anomalie[...]
|
|
|
16
|
|
75%
|
|
Computer Assisted Mechanics and Engineering Sciences
|
|
EN |
This paper presents a new dual model combining binary and real-valued representations of samples for negative selection algorithms. Recent research show that the two types of encoding can produce quite good results for some types of datasets when they are applied separately in such algorithms. Besid[...]
|
|
|
17
|
|
75%
|
|
Diagnostyka
|
|
PL |
W artykule przedstawiono problem związany ze zmieniającą się dynamicznie jakością paliwa podczas sterowania procesem spalania. Opisano sposób pomiaru zmiennych procesowych związanych z tym procesem. W kolejnej części artykułu autor przedstawił schemat, idee oraz działanie algorytmu genetycznego. Zos[...]
|
EN |
The article presents the problem of dynamically changing fuel quality during the control of combustion process. The way of the measurement process variables related with this process was described. In the next part of the article schematics, ideas and genetic algorithm were presented by the author. [...]
|
|
|
18
|
|
63%
|
|
Zeszyty Naukowe Politechniki Białostockiej. Informatyka
|
|
PL |
Jednym z kluczowych parametrów algorytmów wykrywania anomalii jest metryka (norma) służąca do obliczania odległości pomiędzy dwiema próbkami, która odzwierciedla ich podobieństwo. Jest ona szczególnie istotna w przypadkach operowania na zbiorach o wielu wymiarach takich, z jakimi mamy do czynienia w[...]
|
EN |
One of the key parameters of algorithms for anomaly detection is the metric (norm) applied to calculate the distance between every two samples which reflect its proximity. It is especially important when we operate on real-valued high dimensional datasets, i.e. when we deal with the problem of intru[...]
|
|
|
19
|
|
63%
|
|
Przegląd Elektrotechniczny
|
|
PL |
Analiza samopodobieństwa i wykrywania nieprawidłowości działania sieci stanowi interesujący problem dla naukowców na całym świecie. W artykule pokazano wykorzystanie współczynnika Hursta, jako parametru na podstawie którego można wykryć wszelkie anomalia pracy sieci. Odchylenia od wartości bazowej p[...]
|
EN |
Self-similarity analysis and anomaly detection in networks are interesting field of research and scientific work of scientists around the world. Simulation studies have demonstrated that the Hurst parameter estimation can be used to detect traffic anomaly – the Hurst values are compared with confide[...]
|
|
|
20
|
|
63%
|
|
Przegląd Telekomunikacyjny + Wiadomości Telekomunikacyjne
|
|
PL |
Rozwój sieci komputerowych oraz teleinformatyki umożliwił zdobywanie wielkiej ilości danych. Istotna jest jednak wiedza z ich pomocą zdobywana. Jest to możliwe dzięki zastosowaniu eksploracji danych. Przedstawiono podstawowy podział metod eksploracji danych oraz rozliczne ich zastosowania w telekomu[...]
|
EN |
The modern development of computer networks and teleinformatics has enabled the acquisition of great amounts of data. However, the discovered knowledge is important. This is possible through the use of data mining. The article presents the basic division of data mining methods and their numerous app[...]
|
|
|