Network anomaly detection in time series using distance based outlier detection with cluster density analysis
K Flanagan, E Fallon, P Connolly… - … and Applications (ITA), 2017 - ieeexplore.ieee.org
It is common place in any organizational environment that data stored internally does not
necessarily belong to the company storing the data. In such cases, keeping this data …
necessarily belong to the company storing the data. In such cases, keeping this data …
Detection of anomalies in data for monitoring of security components in the Internet of Things
VA Desnitsky, IV Kotenko… - 2015 XVIII International …, 2015 - ieeexplore.ieee.org
The increasing urgency and expansion of information systems implementing the Internet of
Things (IoT) concept determine the importance of the investigation in the field of protection …
Things (IoT) concept determine the importance of the investigation in the field of protection …
Towards aiops in edge computing environments
Edge computing was introduced as a technical enabler for the demanding requirements of
new network technologies like 5G. It aims to overcome challenges related to centralized …
new network technologies like 5G. It aims to overcome challenges related to centralized …
A novel unsupervised anomaly detection approach for intrusion detection system
W Chen, F Kong, F Mei, G Yuan… - 2017 ieee 3rd …, 2017 - ieeexplore.ieee.org
Network Anomaly Detection plays an important part in network security. Among the state-of-
the-art approaches, unsupervised anomaly detection is effective when dealing with …
the-art approaches, unsupervised anomaly detection is effective when dealing with …
Online privacy-preserving data-driven network anomaly detection
We study online privacy-preserving anomaly detection in a setting in which the data are
distributed over a network and locally sensitive to each node, and a probabilistic data model …
distributed over a network and locally sensitive to each node, and a probabilistic data model …
Integration of cloud computing with internet of things: challenges and open issues
The Internet of Things (IoT) is becoming the next Internet-related revolution. It allows billions
of devices to be connected and communicate with each other to share information that …
of devices to be connected and communicate with each other to share information that …
Simulation and modeling for anomaly detection in IoT network using machine learning
Today we are living in an era where everything is changing to be smart, whether it be a
smart home, smart industries, smart irrigation, or a smart meter, where the word smart refers …
smart home, smart industries, smart irrigation, or a smart meter, where the word smart refers …
Anomaly detection in iaas clouds
F Doelitzscher, M Knahl, C Reich… - 2013 IEEE 5th …, 2013 - ieeexplore.ieee.org
Security is still a major concern in Cloud computing, especially the detection of nefarious
use or abuse of cloud instances. One reason for this, is the ever-growing complexity and …
use or abuse of cloud instances. One reason for this, is the ever-growing complexity and …
Unsupervised labeling for supervised anomaly detection in enterprise and cloud networks
S Baek, D Kwon, J Kim, SC Suh… - 2017 IEEE 4th …, 2017 - ieeexplore.ieee.org
Identifying anomalous events in the network is one of the vital functions in enterprises, ISPs,
and datacenters to protect the internal resources. With its importance, there has been a …
and datacenters to protect the internal resources. With its importance, there has been a …
Outlier detection: A survey on techniques of WSNs involving event and error based outliers
In the recent few years, many wireless sensor networks have been distributed systematically
in the real world to collect valuable raw sensed data. However, the crucial point of challenge …
in the real world to collect valuable raw sensed data. However, the crucial point of challenge …