2015
DOI: 10.1016/j.dss.2015.02.014
|View full text |Cite
|
Sign up to set email alerts
|

Early detection of network element outages based on customer trouble calls

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
7
0

Year Published

2016
2016
2022
2022

Publication Types

Select...
6
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 16 publications
(9 citation statements)
references
References 33 publications
0
7
0
Order By: Relevance
“…The authors stated that successfully identified Denial of Service (DoS) attacks in the network traffic. Furthermore, the authors in [11] combined four well-established detection approaches: timebased detection, Neyman-Pearson detection, Bayesian Network decision approach and early detection, to detect outages on telecommunication network. Finally, a non-linear correlation approach based on mutual information has been proposed by the authors in [12] in order to reduce the false positive alarms in the intrusion detection systems.…”
Section: Related Workmentioning
confidence: 99%
“…The authors stated that successfully identified Denial of Service (DoS) attacks in the network traffic. Furthermore, the authors in [11] combined four well-established detection approaches: timebased detection, Neyman-Pearson detection, Bayesian Network decision approach and early detection, to detect outages on telecommunication network. Finally, a non-linear correlation approach based on mutual information has been proposed by the authors in [12] in order to reduce the false positive alarms in the intrusion detection systems.…”
Section: Related Workmentioning
confidence: 99%
“…Depending on the situation there are numerous ways to analyze and detect anomalies [26]; classification based, clustering-based, or using statistical methods and information theory. Deljac et al in [26], [25], where they used a Bayesian network for the outage detection in telecommunication networks. Clustering-based techniques regard unsupervised learning engines, mainly for unlabeled data.…”
Section: Anomaly Detectionmentioning
confidence: 99%
“…How to detect and defend against cyber attacks is a common concern for both the industry and the academia. There are some academic achievements made in machine learning based intrusion detection technology such as Bayesian, SVM, RBM, ANN [ 5–11 ] , and other important network defense frameworks such as ASA and NIST provide ideas for improving network security from different perspectives. However, with the frequent outbreak of cyber attacks, we found that a lot of computer resources are necessary for some cyber attacks, such as the distributed denial of service (DDoS), which is difficult for individuals to conduct.…”
Section: Introductionmentioning
confidence: 99%