Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Filters








25,060 Hits in 5.7 sec

The need for simulation in evaluating anomaly detectors

Haakon Ringberg, Matthew Roughan, Jennifer Rexford
2008 Computer communication review  
In this paper we argue that there are numerous important questions regarding the effectiveness of anomaly detectors that cannot be answered by the evaluation techniques employed today.  ...  What is quite surprising, however, is the lack of controlled evaluation of these detectors.  ...  A simulation environment for this type of detector would need to account for packet dynamics.  ... 
doi:10.1145/1341431.1341443 fatcat:kes7uzfl4jbvtmffduvoivvjym

Discrete R-Contiguous bit Matching mechanism appropriateness for anomaly detection in Wireless Sensor Networks

Muhammad Zeeshan, Huma Javed, Sifat Ullah
2017 International Journal of Communication Networks and Information Security  
In this paper use of light-weighted R-Contiguous Bit matching for attack detection in WSNs has been evaluated.  ...  The proposed model has been tested against some of the attacks. The high detection rate has proved the appropriateness of R-Contiguous bit matching mechanism for anomaly detection in WSNs.  ...  They rely on the anomaly pattern which needs updating and this result in memory overhead for WSNs.  ... 
dblp:journals/ijcnis/ZeeshanJU17 fatcat:ea2zyjnb7rhapi4z3ryybcxcym

WebClass

Haakon Ringberg, Augustin Soule, Jennifer Rexford
2008 Computer communication review  
In particular, it is important to evaluate detectors on traces from operational networks because it is in this setting that the detectors must ultimately succeed.  ...  We argue that evaluating anomaly detectors on manually labeled traces is both important and unavoidable.  ...  Shared Back-End Database WebClass is a system for evaluating anomaly detectors, not an anomaly detector. Running an anomaly detector is performed separately.  ... 
doi:10.1145/1341431.1341437 fatcat:x6wffz467jfcbijqc27ogb73ca

Sequential Feature Explanations for Anomaly Detection [article]

Md Amran Siddiqui, Alan Fern, Thomas G. Dietterich, Weng-Keen Wong
2015 arXiv   pre-print
To address this issue, we study the problems of computing and evaluating sequential feature explanations (SFEs) for anomaly detectors.  ...  To do this we construct anomaly detection benchmarks from real data sets along with artificial experts that can be simulated for evaluation.  ...  In particular, the simulated analyst only needed to be shown a single feature on average in order to correctly detect the anomalies.  ... 
arXiv:1503.00038v1 fatcat:rw2qsv4vq5cbteieseqzxm6muy

Contextual Anomaly Detection in Big Sensor Data

Michael A. Hayes, Miriam A.M. Capretz
2014 2014 IEEE International Congress on Big Data  
The work proposed in this paper outlines a contextual anomaly detection technique for use in streaming sensor networks.  ...  Further, most current techniques for anomaly detection only consider the content of the data source, i.e. the data itself, without concern for the context of the data.  ...  Additionally, the authors would like to acknowledge the support provided by Powersmiths.  ... 
doi:10.1109/bigdata.congress.2014.19 dblp:conf/bigdata/HayesC14 fatcat:oi2wpfqorbgqtlwpviblinajki

An Immunology Inspired Flow Control Attack Detection Using Negative Selection with R-Contiguous Bit Matching for Wireless Sensor Networks

Muhammad Zeeshan, Huma Javed, Amna Haider, Aumbareen Khan
2015 International Journal of Distributed Sensor Networks  
An Anomaly Detection System (ADS) framework inspired from the Human Immune System is implemented in this paper for detecting Sybil attacks in WSNs.  ...  The work has been tested in Omnet++ against Sybil attacks for WSNs.  ...  Conflict of Interests The authors declare that there is no conflict of interests regarding the publication of this paper.  ... 
doi:10.1155/2015/169654 fatcat:pkfqehjq6fgv3hqevsxpvhjiva

Ultrasonic measurement and monitoring of loads in bolts used in structural joints

Ajay M. Koshti, Peter J. Shull
2015 Structural Health Monitoring and Inspection of Advanced Materials, Aerospace, and Civil Infrastructure 2015  
These applications were initially developed for measuring and monitoring preload in the NASA Space Shuttle Orbiter critical joints but are also applicable for monitoring loads in other critical bolted  ...  These applications were initially developed for measuring and monitoring preload in the NASA Space Shuttle Orbiter critical joints. word The paper is an overview of work by the author in measuring and  ...  Resolution of the detector used in these simulation runs uses the definition given in ASTM E 2737-10 standard practice for digital detector array performance evaluation and long-term stability.  ... 
doi:10.1117/12.2083220 fatcat:ljktpmbgenhttl3ap2yn5h24ty

Frequency-based anomaly detection for the automotive CAN bus

Adrian Taylor, Nathalie Japkowicz, Sylvain Leblanc
2015 2015 World Congress on Industrial Control Systems Security (WCICSS)  
As part of a defence against these attacks, we evaluate an anomaly detector for the automotive controller area network (CAN) bus.  ...  We also show how a similar measure of the data contents of packets is not effective for identifying anomalies.  ...  As part of a defence against these attacks, we evaluate an anomaly detector for the automotive controller area network (CAN) bus.  ... 
doi:10.1109/wcicss.2015.7420322 dblp:conf/wcicss/TaylorJL15 fatcat:45dwtabzvndj3co3kpygzkvpri

Research on Self-Monitoring Method for Anomalies of Satellite Atomic Clock

Lei Feng, Guotong Li
2016 International Journal of Aerospace Engineering  
So the monitoring for anomalies of the satellite atomic clock is very important.  ...  In this paper, a complete autonomous monitoring method for the satellite clock is put forward, which is, respectively, based on Phase-Locked Loop (PLL) and statistical principle.  ...  variance to evaluate clock stability in real time and the three-state Kalman filter for large drift-rate anomaly.  ... 
doi:10.1155/2016/1759512 fatcat:ftmlgqmaxfgllmtcxa4ag23lly

A Unified Remote Sensing Anomaly Detector Across Modalities and Scenes via Deviation Relationship Learning [article]

Jingtao Li, Xinyu Wang, Hengwei Zhao, Liangpei Zhang, Yanfei Zhong
2023 arXiv   pre-print
Furthermore, we design an instantiation of the reformulation in the data, architecture, and optimization aspects. Simulated spectral and spatial anomalies drive the instantiated architecture.  ...  Given the diversity in earth anomaly types, a unified anomaly detector across modalities and scenes should be cost-effective and flexible to new earth observation sources and anomaly types.  ...  For the simulation of both spectral anomalies and spatial anomalies, the spatial anomaly simulation can result in a more robust performance in most modalities, regardless of the l O simulation.  ... 
arXiv:2310.07511v1 fatcat:r6r3xzkdsned5gff3p3s44p5xu

Spectral anomaly methods for aerial detection using KUT nuisance rejection

R.S. Detwiler, D.M. Pfund, M.J. Myjak, J.A. Kulisek, C.E. Seifert
2015 Nuclear Instruments and Methods in Physics Research Section A : Accelerators, Spectrometers, Detectors and Associated Equipment  
The algorithm has been optimized for two 15 multi-detector systems; a NaI(Tl)-detector based system and a CsI detector array.  ...  The work here details the adaptation and 12 optimization of the PNNL-developed algorithm NSCRAD (Nuisance-Rejecting Spectral 13 Comparison Ratios for Anomaly Detection), a spectral anomaly method previously  ...  two flight locations 15 whether the NSCRAD settings need to be adjusted with altitud 16 Example of NSCRAD Energy windows for two sets of threat sources, with KUT The spectral anomaly method NSCRAD  ... 
doi:10.1016/j.nima.2015.01.040 fatcat:ywmkxt2h5bbrnknrdsqslnv7vq

Crowd-based detection of routing anomalies on the internet

Rahul Hiran, Niklas Carlsson, Nahid Shahmehri
2015 2015 IEEE Conference on Communications and Network Security (CNS)  
In this paper we present and evaluate a user-centric crowd-based approach in which users passively monitor their network traffic, share information about potential anomalies, and apply combined collaborative  ...  Our data-driven analysis using longitudinal and distributed RTT measurements also provides insights into detector selection and the relative weight that should be given to candidate detectors at different  ...  Second, using a simple system model and tracedriven simulations, we evaluate the set of detector nodes that provides the best detection rates for a candidate victim (Section IV).  ... 
doi:10.1109/cns.2015.7346850 dblp:conf/cns/HiranCS15 fatcat:qyihgs2l35btfky62ufi2tmpra

Magnetic anomaly signal detection using parallel monostable stochastic resonance system

Liu Wang, Liu Zhongyan, Zhang Qi, Xu Yujing, Liu Shuchang, Chen Zhuo, Zhu Canlin, Wang Ze, Pan Mengchun, Hu Jiafei, Li Peisen
2020 IEEE Access  
It can be expected to be widely used in the field of magnetic anomaly detection with PMSR system.  ...  It provides an effective approach to detect the weak magnetic anomaly signal in low signal-to-noise ratio.  ...  Finally, the simulation and experiment are conducted, in which we analyze the performance of PMSR detector in different magnetic anomaly signal waveforms. II.  ... 
doi:10.1109/access.2020.3020881 fatcat:4pgg5geupbemxnptvh3yzf6jpq

Online data-driven anomaly detection in autonomous robots

Eliahu Khalastchi, Meir Kalech, Gal A. Kaminka, Raz Lin
2014 Knowledge and Information Systems  
Not all faults can be known in advance, and hence, anomaly detection is required. In this paper, we present an online datadriven anomaly detection approach (ODDAD) for autonomous robots.  ...  We empirically evaluate ODDAD in different domains: commercial unmanned aerial vehicles (UAVs), a vacuum-cleaning robot, a high-fidelity flight simulator and an electrical power system of a spacecraft.  ...  Acknowledgments This research was funded in part by ISF Grant #1511/12 and by Kamin program. As always, thanks to K. Ushi and K. Ravit.  ... 
doi:10.1007/s10115-014-0754-y fatcat:jnjwxbgwo5duxky2ni7y2lnazy

Recommendations For Core Monitoring To Enhance The Detection And Discrimination Of Anomalies By Neutron Noise Measurements

J. Herb, C. Blasius, C. Demazière, P. Stulik, J. Machek
2022 Zenodo  
These methods and tools allow the detection of anomalies in commercial nuclear reactor cores during operation by using the measurements of the fluctuations of the neutron flux – the so-called neutron noise  ...  – by very few detectors.  ...  ACKNOWLEDGEMENTS The CORTEX research project has received funding from the Euratom research and training programme 2014-2018 under grant agreement No 754316.  ... 
doi:10.5281/zenodo.6997380 fatcat:hd5u35fdpzfjljpy6pqumqacki
« Previous Showing results 1 — 15 out of 25,060 results