2012 Proceedings IEEE INFOCOM 2012
DOI: 10.1109/infcom.2012.6195548
|View full text |Cite
|
Sign up to set email alerts
|

Robust feature selection and robust PCA for internet traffic anomaly detection

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
45
0

Year Published

2014
2014
2022
2022

Publication Types

Select...
5
3

Relationship

1
7

Authors

Journals

citations
Cited by 77 publications
(45 citation statements)
references
References 24 publications
0
45
0
Order By: Relevance
“…The anomaly scores , and the two can be compared to derive an evaluation of the detection technique against the scenario represented by the dataset. In order to aid the visualization process of the dataset, we also present some of the anomaly-score tables visually as anomaly-score graphs (ASGs) 7 .…”
Section: Evaluation Methodsmentioning
confidence: 99%
See 2 more Smart Citations
“…The anomaly scores , and the two can be compared to derive an evaluation of the detection technique against the scenario represented by the dataset. In order to aid the visualization process of the dataset, we also present some of the anomaly-score tables visually as anomaly-score graphs (ASGs) 7 .…”
Section: Evaluation Methodsmentioning
confidence: 99%
“…Better performance is indicated by curves that tend to occupy the top left, as these imply that sensitivity can be decreased to eliminate more FPs without degrading the TPR. 7 An ASG displays a time series of outputs (anomaly scores) from a detector. Our particular ASGs are annotated with the periods during which attacks (GT = 1 in pink) and migration (IMI = 1 in pale green) occur.…”
Section: Evaluation Methodsmentioning
confidence: 99%
See 1 more Smart Citation
“…This paper is one of the first to draw the attention to the fact that in dynamic environments and continuously changing large media repositories, robustness should be an important aspect of feature selection. Robust feature selection has been addressed in other domains, such as in internet traffic anomaly detection [41] and, especially, in bioinformatics. Several approaches have been suggested for the analysis of gene expression data obtained from microarray experiments [1,4], for example in [19,39,44,58].…”
Section: Performance Metricsmentioning
confidence: 99%
“…This was only done for the regular applications given that illicit ones have few datastreams and small variability and would be completely eliminated from the dataset, even for such small trimming percentiles. Apart from that, and following the recommendations in (Pascoal et al 2012;Pascoal 2014), data was smoothed using a logarithm transformation (ln(x + 1), to overcome the existence of zeros). SPCA, estimated according with the four methods under study, was applied to this dataset and percentages of explained variance from the conventional and symbolic approach are summarized in Table 2.…”
Section: Analysis Of Internet Datamentioning
confidence: 99%