IEEE INFOCOM 2019 - IEEE Conference on Computer Communications 2019
DOI: 10.1109/infocom.2019.8737541
|View full text |Cite
|
Sign up to set email alerts
|

Detecting Anomaly in Large-scale Network using Mobile Crowdsourcing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
10
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 10 publications
(10 citation statements)
references
References 17 publications
0
10
0
Order By: Relevance
“…Therefore, obtaining labelled log data for any applications area of interest is often difficult and it is mostly unbalanced or system specific; hence, it needs to be pre-processed before analysis. In addition, obtaining a large-scale log anomaly dataset with high-quality ground truth has been an on-going challenge [38][39][40]. Labelling log anomalies in a dataset requires expert's assistance and therefore it is labor intensive and often expensive.…”
Section: Real-time Security With Unsupervised Deep Learning Modelsmentioning
confidence: 99%
See 4 more Smart Citations
“…Therefore, obtaining labelled log data for any applications area of interest is often difficult and it is mostly unbalanced or system specific; hence, it needs to be pre-processed before analysis. In addition, obtaining a large-scale log anomaly dataset with high-quality ground truth has been an on-going challenge [38][39][40]. Labelling log anomalies in a dataset requires expert's assistance and therefore it is labor intensive and often expensive.…”
Section: Real-time Security With Unsupervised Deep Learning Modelsmentioning
confidence: 99%
“…Labelling log anomalies in a dataset requires expert's assistance and therefore it is labor intensive and often expensive. Hence, supervised machine learning strategies like [38][39][40] that depend on prior patterns of normal and abnormal behaviours are not suitable for real-time anomaly detection systems. Many recent works like [33,41], propose unsupervised machine learning algorithms for detecting anomalies.…”
Section: Real-time Security With Unsupervised Deep Learning Modelsmentioning
confidence: 99%
See 3 more Smart Citations