2010 IEEE Global Telecommunications Conference GLOBECOM 2010 2010
DOI: 10.1109/glocom.2010.5683878
|View full text |Cite
|
Sign up to set email alerts
|

Evaluation of Anomaly Detection Based on Sketch and PCA

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
22
0

Year Published

2013
2013
2021
2021

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 22 publications
(22 citation statements)
references
References 13 publications
0
22
0
Order By: Relevance
“…In Ref. [16], Yoshiki Kanda et al proposed a new method that combines sketches and PCA to detect and identify the source IP addresses associated with the traffic anomalies in the backbone traces measured at a single link. At the same time, this algorithm has been used in worm signatures detection, such as Ref.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…In Ref. [16], Yoshiki Kanda et al proposed a new method that combines sketches and PCA to detect and identify the source IP addresses associated with the traffic anomalies in the backbone traces measured at a single link. At the same time, this algorithm has been used in worm signatures detection, such as Ref.…”
Section: Related Workmentioning
confidence: 99%
“…Then we calculate the sum of the amplitudes represented by the bit with value 1 during a continuous time window or time bin of the same size, and use the set of amplitude values obtained to construct a matrix. After that, we use Principal Component Analysis (PCA) technology [8][9] to analyse this highdimension matrix and get the main component to reconstruct the original data. At the end, the average of all the rebuilt application streams is considered as the signature of this application.…”
Section: Introductionmentioning
confidence: 99%
“…In [3], after splitting the source IP address into keys, it was further split by applying another hash function to the split data, and then Principal Component Analysis (PCA) was applied to detect traffic anomalies. In this case, eight different hash functions, with a hash table size of 1024, were used as sketch parameters.…”
Section: Overview Of the Sketch Schemesmentioning
confidence: 99%
“…Previous studies concerning sketch schemes did not clarify the impact of sketch parameters on the anomaly detection performance [2,3]. Thus, our research aimed to evaluate the processing time and traffic anomaly detection accuracy using a sketch as a function of two sketch parameters: the number of hash functions and hash table size.…”
Section: Introductionmentioning
confidence: 99%
“…In [7], OLIN, an online classification system, dynamically adjusts The recent research literature has proposed more tractable techniques for anomaly detection and classification [8,9,10,11]. These proposals rely on a common approach to data analysis: they apply dimensionality reduction techniques such as sketches [12,3] or principal components [13,14] to the aggregate network traffic.…”
Section: State Of the Artmentioning
confidence: 99%