Showing 1 - 20 results of 22 for search '"anomaly detection"', query time: 0.08s Refine Results
  1. 1

    Packet header anomaly detection using statistical analysis by Yassin, Warusia, Udzir, Nur Izura, Abdullah, Azizol, Abdullah @ Selimun, Mohd Taufik, Muda, Zaiton, Zulzalil, Hazura

    Published 2014
    “…The disclosure of network packets to recurrent cyber intrusion has upraised the essential for modelling various statistical-based anomaly detection methods lately. Theoretically, the statistical-based anomaly detection method fascinates researcher’s attentiveness, but technologically, the fewer intrusion detection rates persist as vulnerable disputes. …”
    Conference or Workshop Item
  2. 2

    Unsupervised Anomaly Detection with Unlabeled Data Using Clustering by Chimphlee, Witcha, Abdullah, Abdul Hanan, Md. Sap, Mohd. Noor

    Published 2005
    “…We present a clustering-based intrusion detection algorithm, unsupervised anomaly detection, which trains on unlabeled data in order to detect new intrusions. …”
    Get full text
    Conference or Workshop Item
  3. 3

    Integrating genetic algorithms and fuzzy c-means for anomaly detection by Chimphlee, Witcha, Abdullah, Abdul Hanan, Sap, Noor Md., Chimphlee, Siriporn, Srinoy, Surat

    Published 2005
    “…The amount of available network audit data instances is usually large; human labeling is tedious, time-consuming, and expensive. Traditional anomaly detection algorithms require a set of purely normal data from which they train their model. …”
    Get full text
    Conference or Workshop Item
  4. 4

    To identify suspicious activity in anomaly detection based on soft computing by Chimphlee, Witcha, Sap, M., Abdullah, Abdul Hanan, Chimphlee, Siriporn, Srinoy, Surat

    Published 2006
    “…Empirical studies using the network security data set from the DARPA 1998 offline intrusion detection project (KDD 1999 Cup) show the feasibility of misuse and anomaly detection results.…”
    Conference or Workshop Item
  5. 5

    Anomaly detection through spatio-temporal context modeling in crowded scenes by Lu, T., Wu, L., Ma, X., Shivakumara, P., Tan, C.L.

    Published 2014
    “…The proposed framework essentially turns the anomaly detection process into two parts, namely, motion pattern representation and crowded context modeling. …”
    Get full text
    Conference or Workshop Item
  6. 6

    Host-based packet header anomaly detection using statistical analysis by Yassin, Warusia, Udzir, Nur Izura, Abdullah, Azizol, Abdullah @ Selimun, Mohd Taufik, Muda, Zaiton, Zulzalil, Hazura

    Published 2013
    “…The exposure of network packets to frequent cyber attacks has increased the need for designing statistical-based anomaly detection recently. Conceptually, the statistical based anomaly detection attracts researcher's attention, but technically, the low attack detection rates remains an open challenges. …”
    Get full text
    Conference or Workshop Item
  7. 7

    Real valued negative selection for anomaly detection in wireless ad hoc networks by Abdul Majid, Azri, Maarof, Mohd. Aizaini

    Published 2004
    “…To achieve our goal, we studied how the real-valued negative selection algorithm can be applied in wireless ad hoc network network and finally we proposed the enhancements to real-valued negative selection algorithm for anomaly detection in wireless ad hoc network.…”
    Get full text
    Conference or Workshop Item
  8. 8

    Improving the anomaly detection by combining PSO search methods and J48 algorithm by Kurniabudi, Kurniabudi, Abdul Harris, Abdul Harris, Mintaria, Albertus Edward, Darmawijoyo, Darmawijoyo, Stiawan, Deris, Idris, Mohd. Yazid, Budiarto, Rahmat

    Published 2020
    “…Compared with the previous study the proposed technique has better accuracy, TPR, and FPR.Anomaly Detection, CICIDS2017…”
    Conference or Workshop Item
  9. 9
  10. 10

    Campus hybrid intrusion detection system using SNORT and C4.5 Algorithm by Slamet, ., Izzeldin, I. Mohd, Fahmi, Samsuri

    Published 2020
    “…In this paper, the authors built Hybrid Intrusion Detecting System combines misuse detection system with anomaly detection system. The basis of misused detection module is snort, and anomaly detection module is constructed by using Algorithm C4.5 detectors. …”
    Get full text
    Get full text
    Conference or Workshop Item
  11. 11

    Intrusion detection based on K-means clustering and Naïve Bayes classification by Muda, Zaiton, Mohamed Yassin, Warusia, Sulaiman, Md. Nasir, Udzir, Nur Izura

    Published 2011
    “…Intrusion Detection System (IDS) plays an effective way to achieve higher security in detecting malicious activities for a couple of years. Anomaly detection is one of intrusion detection system. …”
    Get full text
    Conference or Workshop Item
  12. 12

    An FPGA-based IP core subscription-oriented fog computing platform by Tan, Tze Hon, Ooi, Chia Yee, Marsono, M. N.

    Published 2022
    “…The throughput and latency of implemented FPGA-based time-series anomaly detection analytics are 3096 detections per second and 0.32 ms, respectively, which is more than 61 × speedup over the reference analytics implemented in software. …”
    Conference or Workshop Item
  13. 13

    Anomaly intrusion detection model using data mining techniques by Abdullah, Abdul Hanan, Rusli, Rozana

    Published 2006
    “…Evaluations are done using unsupervised anomaly detection schemes on the DARPA’98 data sets and real network traffic. …”
    Conference or Workshop Item
  14. 14

    Signature-based anomaly intrusion detection using integrated data mining classifiers by Yassin, Warusia, Udzir, Nur Izura, Abdullah, Azizol, Abdullah @ Selimun, Mohd Taufik, Zulzalil, Hazura, Muda, Zaiton

    Published 2014
    “…In this work, a novel Signature-Based Anomaly Detection Scheme (SADS) which could be applied to scrutinize packet headers' behaviour patterns more precisely and promptly is proposed. …”
    Get full text
    Conference or Workshop Item
  15. 15

    Fast optimization method: an on-line hurst parameter estimator by Idris, Mohd. Yazid, Abdullah, Abdul Hanan, Maarof, Mohd. Aizaini

    Published 2007
    “…The on-line Hurst estimator is crucial to characterize self-similar feature on stochastic process and widely applied in various fields such as in network traffic analysis, bandwidth provisioning and anomaly detection. Recent on-line Hurst estimator based on fast wavelet transform known as real-time wavelet estimator (RWM) is proven can estimates faster than other methods in on-line fashion. …”
    Conference or Workshop Item
  16. 16

    Stepping-stone detection technique for recognizing legitimate and attack connections by Daud, Ali Yusny, Ghazali, Osman, Omar, Mohd Nizam

    Published 2015
    “…However, not all stepping-stone connections are malicious.This paper proposes an enhanced stepping-stone detection (SSD) technique which is capable to identify legitimate connections from stepping-stone connections.Stepping-stone connections are identified from raw network traffics using timing-based SSD approach.Then, they go through an anomaly detection technique to differentiate between legitimate and attack connections.This technique has a promising solution to accurately detecting intrusions from stepping-stone connections.It will prevent incorrect responses that punish legitimate users.…”
    Get full text
    Conference or Workshop Item
  17. 17

    Review of firewall optimization techniques by Shakirah, Saidin, Mohamad Fadli, Zolkipli

    Published 2018
    “…This paper review firewall optimization techniques such as data mining, anomaly detection, and traffic awareness, that have been done throughout time. …”
    Get full text
    Conference or Workshop Item
  18. 18

    Thermal Condition Monitoring of Electrical Installations Based on Infrared Image Analysis by M. S., Jadin, Kamarul Hawari, Ghazali, Soib, Taib

    Published 2013
    “…Therefore, this paper proposed a fast thermal anomaly detection and classification based on qualitative infrared image analysis. …”
    Get full text
    Conference or Workshop Item
  19. 19

    An overview of neural networks use in anomaly intrusion detection systems by Sani, Yusuf, Mohamedou, Ahmed, Ali, Khalid Abdullahi, Farjamfar, Anahita, Azman, Mohamed, Shamsuddin, Solahuddin

    Published 2009
    “…But the main problem of anomaly detection IDS is that; it is very difficult to build, because of the difficulty in defining what is normal and what is abnormal. …”
    Get full text
    Conference or Workshop Item
  20. 20

    Anomaly intrusion detection systems in IoT using deep learning techniques: a survey by Alsoufi, Muaadh. A., Razak, Shukor, Md. Siraj, Maheyzah, Ali, Abdulalem, Nasser, Maged, Abdo, Salah

    Published 2021
    “…Consequently, improving the performance of anomaly detection requires the use of advanced deep learning techniques instead of traditional shallow learning approaches. …”
    Conference or Workshop Item