-
1
Unsupervised Anomaly Detection with Unlabeled Data Using Clustering
Published 2005“…We present a clustering-based intrusion detection algorithm, unsupervised anomaly detection, which trains on unlabeled data in order to detect new intrusions. …”
Get full text
Conference or Workshop Item -
2
Integrating genetic algorithms and fuzzy c-means for anomaly detection
Published 2005“…The amount of available network audit data instances is usually large; human labeling is tedious, time-consuming, and expensive. Traditional anomaly detection algorithms require a set of purely normal data from which they train their model. …”
Get full text
Conference or Workshop Item -
3
To identify suspicious activity in anomaly detection based on soft computing
Published 2006“…Empirical studies using the network security data set from the DARPA 1998 offline intrusion detection project (KDD 1999 Cup) show the feasibility of misuse and anomaly detection results.…”
Conference or Workshop Item -
4
Anomaly detection of intrusion based on integration of rough sets and fuzzy c-means
Published 2005Get full text
Article -
5
Iterative window size estimation on self-similarity measurement for network traffic anomaly detection
Published 2004“…Thus, the purpose of this method is to minimize the curve-fitting error on self-similarity measurement and detection loss probability in anomaly detection. This iterative method was applied to network traffic data provided by Lincoln Lab, Massachuset Institute of Technology (MIT). …”
Article -
6
A feature selection algorithm for anomaly detection in grid environment using k-fold cross validation technique
Published 2017Conference or Workshop Item -
7
Anomaly intrusion detection model using data mining techniques
Published 2006“…Evaluations are done using unsupervised anomaly detection schemes on the DARPA’98 data sets and real network traffic. …”
Conference or Workshop Item -
8
Fast optimization method: an on-line hurst parameter estimator
Published 2007“…The on-line Hurst estimator is crucial to characterize self-similar feature on stochastic process and widely applied in various fields such as in network traffic analysis, bandwidth provisioning and anomaly detection. Recent on-line Hurst estimator based on fast wavelet transform known as real-time wavelet estimator (RWM) is proven can estimates faster than other methods in on-line fashion. …”
Conference or Workshop Item