Proceedings of the 2010 IEEE 6th International Conference on Intelligent Computer Communication and Processing 2010
DOI: 10.1109/iccp.2010.5606421
|View full text |Cite
|
Sign up to set email alerts
|

Combining sketch and wavelet models for anomaly detection

Abstract: Statistics-based anomaly detections have been studied and implemented widely due to their potential to discover unseen anomalies. Several data analyzing techniques such as Wavelet have been successfully applied to this field of research. Wavelet analysis is one of the popular techniques that can be used to extract unusual patterns hidden within time-series data. When combined with the powerful data summarization technique like sketch, it could be able to detection significant changes in network data without an… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
12
0

Year Published

2012
2012
2023
2023

Publication Types

Select...
7
1

Relationship

1
7

Authors

Journals

citations
Cited by 12 publications
(12 citation statements)
references
References 9 publications
0
12
0
Order By: Relevance
“…Previous studies concerning sketch schemes did not clarify the impact of sketch parameters on the anomaly detection performance [2,3]. Thus, our research aimed to evaluate the processing time and traffic anomaly detection accuracy using a sketch as a function of two sketch parameters: the number of hash functions and hash table size.…”
Section: Introductionmentioning
confidence: 99%
“…Previous studies concerning sketch schemes did not clarify the impact of sketch parameters on the anomaly detection performance [2,3]. Thus, our research aimed to evaluate the processing time and traffic anomaly detection accuracy using a sketch as a function of two sketch parameters: the number of hash functions and hash table size.…”
Section: Introductionmentioning
confidence: 99%
“…The observed sketch is compared with the forecasted model and result is declared accordingly. Some of the pioneer works in this area have been done by S. Pukkawanna & K. Fukuda in [13]. They have used sketches to identify source IP addresses of anomalous traffic efficiently.…”
Section: Sketch Based Techniques Could Be Used To Resolve the Problemmentioning
confidence: 99%
“…Then, they filtered only a set of scales and detected anomalies in the Wavelet coefficients. The works in [9], [12], [24] enhanced their DWT-based anomaly detectors by adding traffic sketching before performing anomaly detection. The authors in [4] applied Continuous Wavelet Transform (CWT) instead of DWT to detect volume-based network anomalies.…”
Section: Related Workmentioning
confidence: 99%
“…The authors in [8] utilized the sketch technique to randomly aggregate traffic flows and then used CUmulative SUM (CUSUM) to identify change points. The sketch technique was also applied together with PCA [27] or Wavelet transform [9], [12], [24] to detect unusual events.…”
Section: Introductionmentioning
confidence: 99%