نتایج جستجو برای: statistical anomaly detection

تعداد نتایج: 939306  

Journal: :CoRR 2015
Jonathan Root Jing Qian Venkatesh Saligrama

We propose a non-parametric anomaly detection algorithm for high dimensional data. We score each datapoint by its average KNN distance, and rank them accordingly. We then train limited complexity models to imitate these scores based on the max-margin learning-to-rank framework. A test-point is declared as an anomaly at α-false alarm level if the predicted score is in the α-percentile. The resul...

Journal: :CoRR 2016
Jonathan Root Venkatesh Saligrama Jing Qian

We propose a non-parametric anomaly detection algorithm for high dimensional data. We first rank scores derived from nearest neighbor graphs on n-point nominal training data. We then train limited complexity models to imitate these scores based on the max-margin learningto-rank framework. A test-point is declared as an anomaly at α-false alarm level if the predicted score is in the α-percentile...

2005
John C. McEachen John M. Zachary

This paper describes an effort to provide a holistic view of network conversation exchanges for the purpose of real-time network monitoring and anomaly detection. We argue that monitoring and anomaly detection are necessary mechanisms for ensuring secure and dependable network computing infrastructure. The model for network traffic exchange is based on a modified Ehrenfest urn model and combine...

Journal: :EAI Endorsed Trans. Indust. Netw. & Intellig. Syst. 2015
Mohiuddin Ahmed Adnan Anwar Abdun Naser Mahmood Zubair Shah Michael J. Maher

Anomaly detection is an important aspect of data mining, where the main objective is to identify anomalous or unusual data from a given dataset. However, there is no formal categorization of application-specific anomaly detection techniques for big data and this ignites a confusion for the data miners. In this paper, we categorise anomaly detection techniques based on nearest neighbours, cluste...

2009
Yogendra Kumar JAIN Sandip S. PATIL Samrat Ashok

In Network Security, there is a major issue to secure the public or private network from abnormal users. It is because each network is made up of users, services and computers with a specific behavior that is also called as heterogeneous system. To detect abnormal users, anomaly detection system (ADS) is used. In this paper, we present a novel and hybrid Anomaly Detection System with the uses o...

2012
Manmeet Kaur

A global Internet usage enlarge rate of 380% superior than the period from 2000, the year of the dot-com bubble burst, until present select that Internet technology has become a stand of our daily life. In the similar period, cyber-crime has seen an unbelievable to facilitate to create sophisticated protection device for computers and networks a complete necessity. Firewalls as the major protec...

Mobile Ad-hoc Networks (MANETs) by contrast of other networks have more vulnerability because of having nature properties such as dynamic topology and no infrastructure. Therefore, a considerable challenge for these networks, is a method expansion that to be able to specify anomalies with high accuracy at network dynamic topology alternation. In this paper, two methods proposed for dynamic anom...

2014
Tim Browning

This paper presents techniques based on relative entropy a metric for characterizing structure in data environments and applies them to both measured production performance data as well as synthetic data modeled on the statistical profiles of production data. The proposed technique provides significant improvements over industry standard Gaussian-based multivariate adaptive statistical filter (...

2005
Shai Rubin Mihai Christodorescu Vinod Ganapathy Jonathon T. Giffin Louis Kruger Hao Wang

Existing reputation systems used by online auction houses do not address the concern of a buyer shopping for commodities—finding a good bargain. These systems do not provide information on the practices adopted by sellers to ensure profitable auctions. These practices may be legitimate, like imposing a minimum starting bid on an auction, or fraudulent, like using colluding bidders to inflate th...

2017
P. Subhapriya

An infrastructure build in the big data platform is reliable to challenge the commercial and notcommercial IT development communities of data streams in high dimensional data cluster modeling. The knowledge discovery in database (KDD) is alarmed with the development of methods and techniques for making use of data. The data size is generally growing from day to day. One of the most important st...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید