Interpretable Anomaly Prediction: Predicting anomalous behavior in industry 4.0 settings via regularized logistic regression tools

R Langone, A Cuzzocrea, N Skantzos - Data & Knowledge Engineering, 2020 - Elsevier
Prediction of anomalous behavior in industrial assets based on sensor reading represents a
key focus in modern business practice. As a matter of fact, forecast of forthcoming faults is …

Are we missing labels? A study of the availability of ground-truth in network security research

S Abt, H Baier - 2014 third international workshop on building …, 2014 - ieeexplore.ieee.org
Network security is a long-lasting field of research constantly encountering new challenges.
Inherently, research in this field is highly data-driven. Specifically, many approaches employ …

Automated anomaly detector adaptation using adaptive threshold tuning

MQ Ali, E Al-Shaer, H Khan, SA Khayam - ACM Transactions on …, 2013 - dl.acm.org
Real-time network-and host-based Anomaly Detection Systems (ADSs) transform a
continuous stream of input data into meaningful and quantifiable anomaly scores. These …

Firewall policy reconnaissance: Techniques and analysis

MQ Ali, E Al-Shaer, T Samak - IEEE transactions on information …, 2014 - ieeexplore.ieee.org
In the past decade, scanning has been widely used as a reconnaissance technique to
gather critical network information to launch a follow up attack. To combat, numerous …

Auditing and analysis of network traffic in cloud environment

S Shetty, B Biswal, H Maziku - International Journal of …, 2014 - inderscienceonline.com
Cloud computing allows users to remotely store their data into the cloud and provides on-
demand access to applications and services. The security of the outsourced data in the …

An integrated machine learning and control theoretic model for mining concept-drifting data streams

S Shetty, SK Mukkavilli, LH Keel - 2011 IEEE International …, 2011 - ieeexplore.ieee.org
Anomaly-based network Intrusion Detection Systems (IDS) model patterns of normal activity
and detect novel network attacks. However, these systems depend on the availability of the …

On leveraging stochastic models for remote attestation

T Ali, M Nauman, X Zhang - International conference on trusted systems, 2010 - Springer
Remote attestation is an essential feature of Trusted Computing that allows a challenger to
verify the trustworthiness of a target platform. Existing approaches towards remote …

Two effective methods to detect anomalies in embedded systems

M Zandrahimi, HR Zarandi, MH Mottaghi - Microelectronics Journal, 2012 - Elsevier
Current-day embedded systems are very vulnerable to faults and defects. Anomaly detection
is often the primary means of providing early indication of faults and defects. This paper …

POSTER: revisiting anomaly detection system design philosophy

AB Ashfaq, MQ Ali, E Al-Shaer… - Proceedings of the 2013 …, 2013 - dl.acm.org
The inherent design of anomaly detection systems (ADSs) make them highly susceptible to
evasion attacks and hence their wide-spread commercial deployment has not been …

SON KULLANICILAR İÇİN ANOMALİ SALDIRI TESPİT SİSTEMLERİ

KC Kalıpcıoğlu, C Toğay, EN Yolaçan - … Üniversitesi Mühendislik ve …, 2019 - dergipark.org.tr
Günümüzde yaygın bir şekilde kullanılmakta olan imza tabanlı yaklaşımlar, özellikle sıfır gün
saldırıları gibi henüz tespit edilmemiş saldırı vektörlerine karşı başarısız olmaktadırlar. Bu tip …