Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
×
May 18, 2017 · Our analyses reveal that the process of intrusion detection in these networks exhibits a significant degree of burstiness as well as strong ...
Abstract—We analyze sets of intrusion detection records observed on the networks of several large, nonresidential organizations protected by a form of ...
We examine the output of the fitted model with respect to its statistical properties and demonstrate that the model adequately accounts for intrinsic “bursting” ...
The analyses reveal that the process of intrusion detection in these networks exhibits a significant degree of burstiness as well as strong memory, ...
People also ask
We explore time-series models of these observable network security incidents based on partially observed data using a hidden Markov model with restricted hidden ...
Jul 27, 2017 · This analysis and the model provide better understanding of the observed burstiness and open opportunities for quantifying a network's risks and ...
Aug 1, 2017 · Their scientific paper "Burstiness of Intrusion Detection Process: Empirical Evidence and a Modeling Approach,” is scheduled for publication ...
Burstiness of Intrusion Detection Process: Empirical Evidence and a Modeling Approach ... anomaly detection (ARP anomaly detection, especially) is a novel method.
Burstiness of Intrusion Detection Process: Empirical Evidence and a Modeling Approach ... anomaly detection approach by detecting possible intrusions based on ...
Abstract. Uncertainty is an innate feature of intrusion analysis due to the limited views provided by system monitoring tools, including intrusion detection ...
Missing: Burstiness | Show results with:Burstiness