Combining multiresolution and random projections for robust statistical analysis and anomaly detection
Abstract
References
Index Terms
- Combining multiresolution and random projections for robust statistical analysis and anomaly detection
Recommendations
Combining filtering and statistical methods for anomaly detection
IMC '05: Proceedings of the 5th ACM SIGCOMM conference on Internet measurementIn this work we develop an approach for anomaly detection for large scale networks such as that of an enterprize or an ISP. The traffic patterns we focus on for analysis are that of a network-wide view of the traffic state, called the traffic matrix. In ...
Robust optimization of Random Early Detection
Random Early Detection (RED) is the most widely used Adaptive Queue Management (AQM) mechanism in the internet. Although RED shows better performance than its predecessor, DropTail, its performance is highly sensitive to parameter settings. Under non-...
Network Anomaly Detection Based on Statistical Approach and Time Series Analysis
WAINA '09: Proceedings of the 2009 International Conference on Advanced Information Networking and Applications WorkshopsNetwork always suffers from the traffic anomaly such as router rate change, device restart or the worm attack. The early detection of unusual anomaly in the network is a key to fast recover and avoidance of future serious problem to provide a stable ...
Comments
Information & Contributors
Information
Published In

- General Chair:
- Kanchana Kanchanasut,
- Program Chairs:
- Jens Schmitt,
- Kensuke Fukuda,
- Mario Gerla
Sponsors
- NECTEC
- ThaiREN
- TH NIC
- APNIC
In-Cooperation
Publisher
Association for Computing Machinery
New York, NY, United States
Publication History
Check for updates
Qualifiers
- Research-article
Conference
Acceptance Rates
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 78Total Downloads
- Downloads (Last 12 months)1
- Downloads (Last 6 weeks)0
Other Metrics
Citations
View Options
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in