Robust anomaly detection and regularized domain adaptation of classifiers with application to internet packet-flows

作者: George Kesidis , Jayaram Raghuram , David J. Miller

DOI:

关键词: Email spamThe InternetHost (network)Intrusion detection systemData miningCredit cardAnomaly-based intrusion detection systemComputer scienceNetwork packetAnomaly detection

摘要: Sound, robust methods identify the most suitable, parsimonious set of tests to use with respect prioritized, sequential anomaly detection in a collected batch sample data. While focus is on detecting anomalies network traffic flows and classifying into application types, are also applicable other classification settings, including email spam, (e.g. credit card) fraud detection, imposters, unusual event (for example, images video), host-based computer intrusion equipment or complex system failures, as well anomalous measurements scientific experiments.

参考文章(30)
Denis Zuev, Andrew W. Moore, Traffic Classification Using a Statistical Approach Lecture Notes in Computer Science. pp. 321- 324 ,(2005) , 10.1007/978-3-540-31966-5_25
Patrick Haffner, Nicholas Duffield, Jeffrey Erman, Subhabrata Sen, Yu Jin, Scalable traffic classifier and classifier training system ,(2009)
Richard D. Lawrence, Vijil E. Chenthamarakshan, Yan Liu, Dan Zhang, System and method for domain adaption with partial observation ,(2011)
Wladyslaw Olesinski, Peter Rabinovitch, Statistical trace-based methods for real-time traffic classification ,(2005)
Jonathan Back, Siegfried J. Luft, Application routing in a distributed compute environment ,(2007)
Patrick Haffner, Oliver Spatscheck, Subhabrata Sen, Dongmei Wang, Application signature based traffic classification ,(2006)