Interpretable Anomaly Prediction: Predicting anomalous behavior in industry 4.0 settings via regularized logistic regression tools
R Langone, A Cuzzocrea, N Skantzos - Data & Knowledge Engineering, 2020 - Elsevier
Prediction of anomalous behavior in industrial assets based on sensor reading represents a
key focus in modern business practice. As a matter of fact, forecast of forthcoming faults is …
key focus in modern business practice. As a matter of fact, forecast of forthcoming faults is …
Are we missing labels? A study of the availability of ground-truth in network security research
S Abt, H Baier - 2014 third international workshop on building …, 2014 - ieeexplore.ieee.org
Network security is a long-lasting field of research constantly encountering new challenges.
Inherently, research in this field is highly data-driven. Specifically, many approaches employ …
Inherently, research in this field is highly data-driven. Specifically, many approaches employ …
Automated anomaly detector adaptation using adaptive threshold tuning
Real-time network-and host-based Anomaly Detection Systems (ADSs) transform a
continuous stream of input data into meaningful and quantifiable anomaly scores. These …
continuous stream of input data into meaningful and quantifiable anomaly scores. These …
Firewall policy reconnaissance: Techniques and analysis
MQ Ali, E Al-Shaer, T Samak - IEEE transactions on information …, 2014 - ieeexplore.ieee.org
In the past decade, scanning has been widely used as a reconnaissance technique to
gather critical network information to launch a follow up attack. To combat, numerous …
gather critical network information to launch a follow up attack. To combat, numerous …
Auditing and analysis of network traffic in cloud environment
Cloud computing allows users to remotely store their data into the cloud and provides on-
demand access to applications and services. The security of the outsourced data in the …
demand access to applications and services. The security of the outsourced data in the …
An integrated machine learning and control theoretic model for mining concept-drifting data streams
Anomaly-based network Intrusion Detection Systems (IDS) model patterns of normal activity
and detect novel network attacks. However, these systems depend on the availability of the …
and detect novel network attacks. However, these systems depend on the availability of the …
On leveraging stochastic models for remote attestation
Remote attestation is an essential feature of Trusted Computing that allows a challenger to
verify the trustworthiness of a target platform. Existing approaches towards remote …
verify the trustworthiness of a target platform. Existing approaches towards remote …
Two effective methods to detect anomalies in embedded systems
Current-day embedded systems are very vulnerable to faults and defects. Anomaly detection
is often the primary means of providing early indication of faults and defects. This paper …
is often the primary means of providing early indication of faults and defects. This paper …
POSTER: revisiting anomaly detection system design philosophy
AB Ashfaq, MQ Ali, E Al-Shaer… - Proceedings of the 2013 …, 2013 - dl.acm.org
The inherent design of anomaly detection systems (ADSs) make them highly susceptible to
evasion attacks and hence their wide-spread commercial deployment has not been …
evasion attacks and hence their wide-spread commercial deployment has not been …
SON KULLANICILAR İÇİN ANOMALİ SALDIRI TESPİT SİSTEMLERİ
KC Kalıpcıoğlu, C Toğay, EN Yolaçan - … Üniversitesi Mühendislik ve …, 2019 - dergipark.org.tr
Günümüzde yaygın bir şekilde kullanılmakta olan imza tabanlı yaklaşımlar, özellikle sıfır gün
saldırıları gibi henüz tespit edilmemiş saldırı vektörlerine karşı başarısız olmaktadırlar. Bu tip …
saldırıları gibi henüz tespit edilmemiş saldırı vektörlerine karşı başarısız olmaktadırlar. Bu tip …