A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2020; you can also visit the original URL.
The file type is application/pdf
.
Filters
Burstiness of Intrusion Detection Process: Empirical Evidence and a Modeling Approach
[article]
2017
arXiv
pre-print
Our analyses reveal that the process of intrusion detection in these networks exhibits a significant degree of burstiness as well as strong memory, with burstiness and memory properties that are comparable ...
We analyze sets of intrusion detection records observed on the networks of several large, nonresidential organizations protected by a form of intrusion detection and prevention service. ...
Detection Process: Empirical Evidence and a Modeling Approach Richard Harang, Alexander Kott and thus has a very limited opportunity to cause harm; in this paper we refer to such relatively benign events ...
arXiv:1707.03927v1
fatcat:65zzrbpuczfvlj4s7ar7kaf7lm
Unsupervised and nonparametric detection of information flows
2012
Signal Processing
The problem of detecting the presence of possibly bidirectional and time-varying information flows through two nodes in a network is considered. ...
Only the transmission timing measurements are used in the detection. The proposed technique assumes no parametric flow model and requires no training data. ...
Parametric flow detection under Poisson models In this section, we assume the knowledge of the underlying parametric model for transmission processes and propose a detection algorithm called Bidirectional ...
doi:10.1016/j.sigpro.2012.03.015
fatcat:rxkdzu6ryjhzdg72xuxvzqshwa
A Practical Approach for Performance Analysis of Shared-Memory Programs
2011
2011 IEEE International Parallel & Distributed Processing Symposium
The model is practical because it uses only generally available and non-intrusive inputs derived from the trace of the operating system run-queue and hardware events counters. ...
Parallel programming has transcended from HPC into mainstream, enabled by a growing number of programming models, languages and methodologies, as well as the availability of multicore systems. ...
Tay for suggestions on modeling the memory contention. ...
doi:10.1109/ipdps.2011.68
dblp:conf/ipps/TudorT11
fatcat:3rykwvd2rnf4rabsa6tc5uy6mq
Using Bursty Announcements for Early Detection of BGP Routing Anomalies
[article]
2019
arXiv
pre-print
In this work, we propose a method for early detection of large-scale disruptions based on the analysis of bursty BGP announcements. ...
We propose an algorithm that leverages the burstiness of disruptive updates to provide early detection of large-scale malicious incidents using local collector data. ...
This measure was originally used in the context of intrusion detection in [25] . Let Q A→B be the number of announcements sent by AS A and received by collector B exponentially weighted. ...
arXiv:1905.05835v1
fatcat:xnuawthj4bd4va72b6f47kl6le
Intrusion Detection using Continuous Time Bayesian Networks
2010
The Journal of Artificial Intelligence Research
In both types of systems, the rates of change vary dramatically over time (due to burstiness) and over components (due to service difference). ...
We demonstrate the method by detecting intrusions in the DARPA 1998 BSM dataset. ...
ANOMALY DETECTION Our experimental goal is to detect anomalous processes. We train our CTBN model on normal processes only and test on a mixture of both normal and attack processes. ...
doi:10.1613/jair.3050
fatcat:vshvrcyzvrbk7pununhuqogigy
Physical Processes of Meso-Scale, Dynamic Auroral Forms
2020
Space Science Reviews
in the results from a variety of models of different plasma instabilities. ...
New observations from ground-and space-based instrumentation and theoretical treatments are giving us a clearer view of some of the physical processes behind these auroral forms. ...
Partamies, R. von Steiger) and participants for useful discussions around this topic. CF was supported by a NERC Independent Research Fellowship NE/N014480/1 and STFC Consolidated Grant ST/S000240/1. ...
doi:10.1007/s11214-020-00665-y
fatcat:3n3jkwaahze7vjaoguily7op74
When Moons Create Aurora: The Satellite Footprints on Giant Planets
[chapter]
2012
Auroral Phenomenology and Magnetospheric Processes: Earth and Other Planets
The empirical models are insufficient for reproducing the local and transitional magnetospheric configuration changes during a substorm. ...
For instance experimental evidence from the Viking satellite imager showed a relationship between north-south aligned auroral forms and bursty bulk flows in the mid-tail. ...
This study presents the results of a hybrid Monte Carlo model for sulfur and oxygen ion precipitation at high latitudes, looks at differences with the continuous slowdown model, and compares the results ...
doi:10.1029/2011gm001169
fatcat:ctefy46khnguti6o3uohqexnoq
Malware in the Future? Forecasting of Analyst Detection of Cyber Events
[article]
2018
arXiv
pre-print
A common approach is time-series forecasting of cyber attacks based on data from network telescopes, honeypots, and automated intrusion detection/prevention systems. ...
We used a Bayesian State Space Model for forecasting and found that events one week ahead could be predicted. To quantify bursts, we used a Markov model. ...
The views and conclusions contained in this document are those of the authors and should not be interpreted as representing the official policies, either expressed or implied, of the U.S. ...
arXiv:1707.03243v3
fatcat:y2kuxw5g7vdyzni4o3kf7xknbm
An Automatic Approach for Document-level Topic Model Evaluation
2017
Proceedings of the 21st Conference on Computational Natural Language Learning (CoNLL 2017)
We propose a method for automatically predicting topic model quality based on analysis of documentlevel topic allocations, and provide empirical evidence for its robustness. ...
Extrinsic evaluation of topic models tends to focus exclusively on topic-level evaluation, e.g. by assessing the coherence of topics. ...
Word generation is modelled by a Pitman-Yor process (Chen et al., 2011) . • ntm (Cao et al., 2015) is a neural topic model, where topic-word multinomials are modelled as a look-up layer of words, and ...
doi:10.18653/v1/k17-1022
dblp:conf/conll/BhatiaLB17
fatcat:ue6ahtkp6vbqbeqlqssvvqxpwu
An Automatic Approach for Document-level Topic Model Evaluation
[article]
2017
arXiv
pre-print
We propose a method for automatically predicting topic model quality based on analysis of document-level topic allocations, and provide empirical evidence for its robustness. ...
Extrinsic evaluation of topic models tends to focus exclusively on topic-level evaluation, e.g. by assessing the coherence of topics. ...
Word generation is modelled by a Pitman-Yor process (Chen et al., 2011) . • ntm (Cao et al., 2015) is a neural topic model, where topic-word multinomials are modelled as a look-up layer of words, and ...
arXiv:1706.05140v1
fatcat:fbbewbhfyjd33dvvumkonyjpce
Performance Analysis of Cloud Applications
2018
Symposium on Networked Systems Design and Implementation
This makes Gmail performance difficult to model with a synthetic test and difficult to analyze in production. We describe two techniques for collecting actionable data from a production system. ...
First, coordinated bursty tracing allows us to capture bursts of events across all layers of our stack simultaneously. ...
In contrast, an approach that propagated context across the layers would have been far more intrusive and complex. ...
dblp:conf/nsdi/ArdeleanDE18
fatcat:jwirslqto5crtcm2mmnz2jhuqm
IP packet interleaving: Bridging the gap between theory and practice
2011
2011 IEEE Symposium on Computers and Communications (ISCC)
In this work, after determining the loss burstiness degree of real networks, we implement a real interleaver (we called TimeD), and we tackle the problem of how to apply such a transmission schema to UDP ...
For this aim, we propose a methodology composed of the following steps: (i) firstly, we develop a simulator to study the potential benefits of TimeD, understanding its loss decorrelation power and determining ...
V-A we also evaluate the characteristics of the loss process over a satellite network. The loss model based on 2-MC is also known as Gilbert-Elliott model [13] , [14] . ...
doi:10.1109/iscc.2011.5983976
dblp:conf/iscc/BottaP11
fatcat:li7masq75jbu7islbtrgsqkmeu
Assessment of the Thresholding Impact on Reliability of Anomaly Detection in Network Traffic using Statistical Approach
Оценка влияния трешолдинга на достоверность обнаружения аномальных вторжений в компьютерные сети статистическим методом
2018
Herald of the Bauman Moscow State Technical University Series Instrument Engineering
Оценка влияния трешолдинга на достоверность обнаружения аномальных вторжений в компьютерные сети статистическим методом
We believe that given the results of the tests on our implementation of the attacks and the detection system, the method is a strong candidate for QoS intrusion detection for a low-cost commercial deployment ...
Our approach focusses on real time and quick detection, scalability to large networks, and a negligible false alarm generation rate. ...
Acknowledgements We would like to thank a number of co-researchers who have contributed to several components of this work. These include ...
doi:10.18698/0236-3933-2018-5-56-67
fatcat:p3rwzqzsu5euzacn3ridyw4o6e
IP packet interleaving for UDP bursty losses
2015
Journal of Systems and Software
The bursty nature of losses over the Internet is constantly asking for effective solutions. In this work, we use a comprehensive approach to study packet interleaving for coping with loss burstiness. ...
Thanks to it, we study and solve a number of issues arising in real environments such as network dynamics and interleaving performance. ...
Acknowledgments This work is partially funded by the MIUR projects: PLATINO (PON01 01007), SMART HEALTH (PON04a2 C), S2-MOVE (PON04a3 00058), SIRIO (PON01 02425), and art. 11 DM 593/2000 for NM2 srl. ...
doi:10.1016/j.jss.2015.07.048
fatcat:i5n6r5w3tretffgqst4bbjyhze
Long-range dependence ten years of Internet traffic modeling
2004
IEEE Internet Computing
With the identification of long-range dependence (LRD) in network traffic, the research community has undergone a mental shift from Poisson and memory-less processes to LRD and bursty processes. ...
traffic and explore the current lack of accuracy and robustness in LRD estimation. ...
by heavy-tailed distributions and characterized by burstiness, which indicated that the Poisson process underestimated both burstiness and variability. ...
doi:10.1109/mic.2004.46
fatcat:nwfthxfmbrhq5h65feew764bbu
« Previous
Showing results 1 — 15 out of 254 results