Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Filters








254 Hits in 5.0 sec

Burstiness of Intrusion Detection Process: Empirical Evidence and a Modeling Approach [article]

Richard Harang, Alexander Kott
2017 arXiv   pre-print
Our analyses reveal that the process of intrusion detection in these networks exhibits a significant degree of burstiness as well as strong memory, with burstiness and memory properties that are comparable  ...  We analyze sets of intrusion detection records observed on the networks of several large, nonresidential organizations protected by a form of intrusion detection and prevention service.  ...  Detection Process: Empirical Evidence and a Modeling Approach Richard Harang, Alexander Kott and thus has a very limited opportunity to cause harm; in this paper we refer to such relatively benign events  ... 
arXiv:1707.03927v1 fatcat:65zzrbpuczfvlj4s7ar7kaf7lm

Unsupervised and nonparametric detection of information flows

Jinsub Kim, Lang Tong
2012 Signal Processing  
The problem of detecting the presence of possibly bidirectional and time-varying information flows through two nodes in a network is considered.  ...  Only the transmission timing measurements are used in the detection. The proposed technique assumes no parametric flow model and requires no training data.  ...  Parametric flow detection under Poisson models In this section, we assume the knowledge of the underlying parametric model for transmission processes and propose a detection algorithm called Bidirectional  ... 
doi:10.1016/j.sigpro.2012.03.015 fatcat:rxkdzu6ryjhzdg72xuxvzqshwa

A Practical Approach for Performance Analysis of Shared-Memory Programs

Bogdan Marius Tudor, Yong Meng Teo
2011 2011 IEEE International Parallel & Distributed Processing Symposium  
The model is practical because it uses only generally available and non-intrusive inputs derived from the trace of the operating system run-queue and hardware events counters.  ...  Parallel programming has transcended from HPC into mainstream, enabled by a growing number of programming models, languages and methodologies, as well as the availability of multicore systems.  ...  Tay for suggestions on modeling the memory contention.  ... 
doi:10.1109/ipdps.2011.68 dblp:conf/ipps/TudorT11 fatcat:3rykwvd2rnf4rabsa6tc5uy6mq

Using Bursty Announcements for Early Detection of BGP Routing Anomalies [article]

Pablo Moriano, Raquel Hill, L. Jean Camp
2019 arXiv   pre-print
In this work, we propose a method for early detection of large-scale disruptions based on the analysis of bursty BGP announcements.  ...  We propose an algorithm that leverages the burstiness of disruptive updates to provide early detection of large-scale malicious incidents using local collector data.  ...  This measure was originally used in the context of intrusion detection in [25] . Let Q A→B be the number of announcements sent by AS A and received by collector B exponentially weighted.  ... 
arXiv:1905.05835v1 fatcat:xnuawthj4bd4va72b6f47kl6le

Intrusion Detection using Continuous Time Bayesian Networks

J. Xu, C. R. Shelton
2010 The Journal of Artificial Intelligence Research  
In both types of systems, the rates of change vary dramatically over time (due to burstiness) and over components (due to service difference).  ...  We demonstrate the method by detecting intrusions in the DARPA 1998 BSM dataset.  ...  ANOMALY DETECTION Our experimental goal is to detect anomalous processes. We train our CTBN model on normal processes only and test on a mixture of both normal and attack processes.  ... 
doi:10.1613/jair.3050 fatcat:vshvrcyzvrbk7pununhuqogigy

Physical Processes of Meso-Scale, Dynamic Auroral Forms

C. Forsyth, V. A. Sergeev, M. G. Henderson, Y. Nishimura, B. Gallardo-Lacourt
2020 Space Science Reviews  
in the results from a variety of models of different plasma instabilities.  ...  New observations from ground-and space-based instrumentation and theoretical treatments are giving us a clearer view of some of the physical processes behind these auroral forms.  ...  Partamies, R. von Steiger) and participants for useful discussions around this topic. CF was supported by a NERC Independent Research Fellowship NE/N014480/1 and STFC Consolidated Grant ST/S000240/1.  ... 
doi:10.1007/s11214-020-00665-y fatcat:3n3jkwaahze7vjaoguily7op74

When Moons Create Aurora: The Satellite Footprints on Giant Planets [chapter]

B. Bonfond
2012 Auroral Phenomenology and Magnetospheric Processes: Earth and Other Planets  
The empirical models are insufficient for reproducing the local and transitional magnetospheric configuration changes during a substorm.  ...  For instance experimental evidence from the Viking satellite imager showed a relationship between north-south aligned auroral forms and bursty bulk flows in the mid-tail.  ...  This study presents the results of a hybrid Monte Carlo model for sulfur and oxygen ion precipitation at high latitudes, looks at differences with the continuous slowdown model, and compares the results  ... 
doi:10.1029/2011gm001169 fatcat:ctefy46khnguti6o3uohqexnoq

Malware in the Future? Forecasting of Analyst Detection of Cyber Events [article]

Jonathan Z. Bakdash, Steve Hutchinson, Erin G. Zaroukian, Laura R. Marusich, Saravanan Thirumuruganathan, Charmaine Sample, Blaine Hoffman, and Gautam Das
2018 arXiv   pre-print
A common approach is time-series forecasting of cyber attacks based on data from network telescopes, honeypots, and automated intrusion detection/prevention systems.  ...  We used a Bayesian State Space Model for forecasting and found that events one week ahead could be predicted. To quantify bursts, we used a Markov model.  ...  The views and conclusions contained in this document are those of the authors and should not be interpreted as representing the official policies, either expressed or implied, of the U.S.  ... 
arXiv:1707.03243v3 fatcat:y2kuxw5g7vdyzni4o3kf7xknbm

An Automatic Approach for Document-level Topic Model Evaluation

Shraey Bhatia, Jey Han Lau, Timothy Baldwin
2017 Proceedings of the 21st Conference on Computational Natural Language Learning (CoNLL 2017)  
We propose a method for automatically predicting topic model quality based on analysis of documentlevel topic allocations, and provide empirical evidence for its robustness.  ...  Extrinsic evaluation of topic models tends to focus exclusively on topic-level evaluation, e.g. by assessing the coherence of topics.  ...  Word generation is modelled by a Pitman-Yor process (Chen et al., 2011) . • ntm (Cao et al., 2015) is a neural topic model, where topic-word multinomials are modelled as a look-up layer of words, and  ... 
doi:10.18653/v1/k17-1022 dblp:conf/conll/BhatiaLB17 fatcat:ue6ahtkp6vbqbeqlqssvvqxpwu

An Automatic Approach for Document-level Topic Model Evaluation [article]

Shraey Bhatia and Jey Han Lau and Timothy Baldwin
2017 arXiv   pre-print
We propose a method for automatically predicting topic model quality based on analysis of document-level topic allocations, and provide empirical evidence for its robustness.  ...  Extrinsic evaluation of topic models tends to focus exclusively on topic-level evaluation, e.g. by assessing the coherence of topics.  ...  Word generation is modelled by a Pitman-Yor process (Chen et al., 2011) . • ntm (Cao et al., 2015) is a neural topic model, where topic-word multinomials are modelled as a look-up layer of words, and  ... 
arXiv:1706.05140v1 fatcat:fbbewbhfyjd33dvvumkonyjpce

Performance Analysis of Cloud Applications

Dan Ardelean, Amer Diwan, Chandra Erdman
2018 Symposium on Networked Systems Design and Implementation  
This makes Gmail performance difficult to model with a synthetic test and difficult to analyze in production. We describe two techniques for collecting actionable data from a production system.  ...  First, coordinated bursty tracing allows us to capture bursts of events across all layers of our stack simultaneously.  ...  In contrast, an approach that propagated context across the layers would have been far more intrusive and complex.  ... 
dblp:conf/nsdi/ArdeleanDE18 fatcat:jwirslqto5crtcm2mmnz2jhuqm

IP packet interleaving: Bridging the gap between theory and practice

Alessio Botta, Antonio Pescape
2011 2011 IEEE Symposium on Computers and Communications (ISCC)  
In this work, after determining the loss burstiness degree of real networks, we implement a real interleaver (we called TimeD), and we tackle the problem of how to apply such a transmission schema to UDP  ...  For this aim, we propose a methodology composed of the following steps: (i) firstly, we develop a simulator to study the potential benefits of TimeD, understanding its loss decorrelation power and determining  ...  V-A we also evaluate the characteristics of the loss process over a satellite network. The loss model based on 2-MC is also known as Gilbert-Elliott model [13] , [14] .  ... 
doi:10.1109/iscc.2011.5983976 dblp:conf/iscc/BottaP11 fatcat:li7masq75jbu7islbtrgsqkmeu

Assessment of the Thresholding Impact on Reliability of Anomaly Detection in Network Traffic using Statistical Approach
Оценка влияния трешолдинга на достоверность обнаружения аномальных вторжений в компьютерные сети статистическим методом

М.А. Басараб, МГТУ им. Н.Э. Баумана, О.И. Шелухин, И.А. Коновалов, Московский технический университет связи и информатики, МГТУ им. Н.Э. Баумана
2018 Herald of the Bauman Moscow State Technical University Series Instrument Engineering  
We believe that given the results of the tests on our implementation of the attacks and the detection system, the method is a strong candidate for QoS intrusion detection for a low-cost commercial deployment  ...  Our approach focusses on real time and quick detection, scalability to large networks, and a negligible false alarm generation rate.  ...  Acknowledgements We would like to thank a number of co-researchers who have contributed to several components of this work. These include  ... 
doi:10.18698/0236-3933-2018-5-56-67 fatcat:p3rwzqzsu5euzacn3ridyw4o6e

IP packet interleaving for UDP bursty losses

Alessio Botta, Antonio Pescapé
2015 Journal of Systems and Software  
The bursty nature of losses over the Internet is constantly asking for effective solutions. In this work, we use a comprehensive approach to study packet interleaving for coping with loss burstiness.  ...  Thanks to it, we study and solve a number of issues arising in real environments such as network dynamics and interleaving performance.  ...  Acknowledgments This work is partially funded by the MIUR projects: PLATINO (PON01 01007), SMART HEALTH (PON04a2 C), S2-MOVE (PON04a3 00058), SIRIO (PON01 02425), and art. 11 DM 593/2000 for NM2 srl.  ... 
doi:10.1016/j.jss.2015.07.048 fatcat:i5n6r5w3tretffgqst4bbjyhze

Long-range dependence ten years of Internet traffic modeling

T. Karagiannis, M. Molle, M. Faloutsos
2004 IEEE Internet Computing  
With the identification of long-range dependence (LRD) in network traffic, the research community has undergone a mental shift from Poisson and memory-less processes to LRD and bursty processes.  ...  traffic and explore the current lack of accuracy and robustness in LRD estimation.  ...  by heavy-tailed distributions and characterized by burstiness, which indicated that the Poisson process underestimated both burstiness and variability.  ... 
doi:10.1109/mic.2004.46 fatcat:nwfthxfmbrhq5h65feew764bbu
« Previous Showing results 1 — 15 out of 254 results