[图书][B] A methodological overview on anomaly detection

C Callegari, A Coluccia, A D'Alconzo, W Ellens… - 2013 - Springer
In this Chapter we give an overview of statistical methods for anomaly detection (AD),
thereby targeting an audience of practitioners with general knowledge of statistics. We focus …

Anomaly network traffic detection algorithm based on information entropy measurement under the cloud computing environment

C Yang - Cluster Computing, 2019 - Springer
In recent years, there are more and more abnormal activities in the network, which greatly
threaten network security. Hence, it is of great importance to collect the data which indicate …

Enabling event-triggered data plane monitoring

J Kučera, DA Popescu, H Wang, A Moore… - Proceedings of the …, 2020 - dl.acm.org
We propose a push-based approach to network monitoring that allows the detection, within
the dataplane, of traffic aggregates. Notifications from the switch to the controller are sent …

An information-theoretic method for the detection of anomalies in network traffic

C Callegari, S Giordano, M Pagano - Computers & Security, 2017 - Elsevier
Abstract Anomaly-based Intrusion Detection is a key research topic in network security due
to its ability to face unknown attacks and new security threats. For this reason, many works …

Internet of things' authentication and access control

J Liu, Y Xiao, CLP Chen - International Journal of Security …, 2012 - inderscienceonline.com
The Internet of Things (IoT) is regarded as the next generation worldwide network that
connects every necessary object to facilitate our daily life. Although it is only an abstract …

Error analysis of range–based localisation algorithms in wireless sensor networks

J Zheng, Y Sun, Y Huang, Y Wang… - International Journal of …, 2012 - inderscienceonline.com
Location information is essential when dealing with Wireless Sensor Networks (WSNs). This
paper focuses on the error analysis of range–based localisation algorithms in WSNs. The …

SeReNe: on establishing secure and resilient networking services for an SDN-based multi-tenant datacenter environment

CJ Chung, T Xing, D Huang, D Medhi… - … Systems and Networks …, 2015 - ieeexplore.ieee.org
In the current enterprise data enter networking environment, a major hurdle in the
development of network security is the lack of an orchestrated and resilient defensive …

Monitoring space segmentation in deploying sensor arrays

M Peng, Y Xiao, N Li, X Liang - IEEE Sensors Journal, 2013 - ieeexplore.ieee.org
This paper explores the segmentation of monitoring space that is generated by binary
pyroelectric sensors and reference structure. Each segment in the monitoring space is …

Sketch-based multidimensional IDS: A new approach for network anomaly detection

C Callegari, A Casella, S Giordano… - … IEEE Conference on …, 2013 - ieeexplore.ieee.org
The diffusion of technologies for high speed data transmission over the Internet and the
growing employment of new multimedia services require fast and effective techniques for the …

Seek and push: Detecting large traffic aggregates in the dataplane

J Kučera, DA Popescu, G Antichi, J Kořenek… - arXiv preprint arXiv …, 2018 - arxiv.org
High level goals such as bandwidth provisioning, accounting and network anomaly
detection can be easily met if high-volume traffic clusters are detected in real time. This …