نتایج جستجو برای: statistical anomaly detection

تعداد نتایج: 939306  

Journal: :I. J. Network Security 2007
Zonghua Zhang Hong Shen Yingpeng Sang

It is generally agreed that two key points always attract special concerns during the modelling of anomaly-based intrusion detection. One is the techniques about discerning two classes with different features, another is the construction/selection of the observed sample of normally occurring patterns for system normality characterization. In this paper, instead of focusing on the design of spec...

Journal: :international journal of communications and information technology 2011
o. adaobi m. ghassemian

wireless sensor networks (wsns) arebecoming increasingly popular, and very useful in militaryapplications and environmental monitoring. however,security is a major challenge for wsns because they areusually setup in unprotected environments. our goal in thisstudy is to simulate an intrusion detection system (ids)that monitors the wsn and report intrusions accurately andeffectively. we have thus...

Journal: :iranian journal of science and technology (sciences) 2011
a. h. ansari

in order to obtain maximum information from magnetic and gravity anomaly maps, application of an edgedetection method is necessary. in this regard two commonly used methods are derivative filters and local phase filters. in this paper, a matlab code is expanded to combine an analytic signal filter and a tilt angle filter as a new edge detection filter called asta filter. this method was demonst...

Journal: :Applied Soft Computing 2021

To address one of the most challenging industry problems, we develop an enhanced training algorithm for anomaly detection in unlabelled sequential data such as time-series. We propose outputs a well-designed system are drawn from unknown probability distribution, U, normal conditions. introduce criterion based on classical central limit theorem that allows evaluation likelihood data-point is U....

Journal: :JNW 2013
Zhizhong Wu Xuehai Zhou Jun Xu

In this paper we present an information fusion based distributed anomaly detection system for Android mobile phones. The proposed framework realizes a clientserver architecture, the client continuously extracts various features and transfers to the server, and the server’s major task is to detect anomaly using state-of-art detection algorithms implemented as anomaly detectors. Multiple distribu...

2013
Kamini Nalavade B. B. Meshram

Intrusion detection is an integral part of computer security. It improves the security of information systems by allowing the review of patterns of access in order to discover abnormal activity of users and serving as a deterrent to users attempts to bypass system privilege or protection mechanisms. Anomaly detection systems, a subset of intrusion detection systems, model the normal system/netw...

2001
Somesh Jha Kymie M. C. Tan Roy A. Maxion

This paper presents a statistical anomaly detection algorithm based on Markov chains. Our algorithm can be directly applied for intrusion detection by discovering anomalous activities. Our framework for constructing anomaly detectors is very general and can be used by other researchers for constructing Markov-chain-based anomaly detectors. We also present performance metrics for evaluating the ...

2014
T. Yairi T. Oda Y. Nakajima N. Miura N. Takata

Health monitoring and anomaly detection techniques for artificial satellites are very significant, as it is very hard to repair those space systems on orbit. Authors have proposed the framework of learning-based anomaly detection that applies statistical machine learning and data mining techniques to the satellite telemetry data to automatically obtain normal behavior models which can be used f...

Journal: :Pattern Recognition 2016
Ying Zhang Huchuan Lu Lihe Zhang Xiang Ruan

In this paper, we present a novel anomaly detection framework which integrates motion and appearance cues to detect abnormal objects and behaviors in video. For motion anomaly detection, we employ statistical histograms to model the normal motion distributions and propose a notion of “cut-bin” in histograms to distinguish unusual motions. For appearance anomaly detection, we develop a novel sch...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید