loading
DBSAFEAn Anomaly Detection System to Protect Databases From Exfiltration Attempts
Volume PP - IEEE - Institute of Electrical and Electronics Engineers, Inc.

Attempts by insiders to exfiltrate data have become a severe threat to the enterprise. Conventional data security techniques, such as access control and encryption, must be augmented with techniques to detect anomalies in data access that may indicate...

A robust anomaly detection system
2014 Edition, August 1, 2014 - IEEE - Institute of Electrical and Electronics Engineers, Inc.

Data mining techniques helps to sift through large amount of data for patterns and characteristic rules. Due to great possibility of malicious data entering in any field of concern, it has become a necessity to build not just a generalized model for anomaly...

An AIS based anomaly detection system
2017 Edition, July 1, 2017 - IEEE - Institute of Electrical and Electronics Engineers, Inc.

Artificial immune system(AIS) is inspired from biological immune system(BIS) and has the ability to self-configure, self- learn and self-adapt. Artificial immune system can be used in anomaly detection, threat perception, fraud detection and...

Total ADS: Automated Software Anomaly Detection System
2014 Edition, September 1, 2014 - IEEE - Institute of Electrical and Electronics Engineers, Inc.

When a software system starts behaving abnormally during normal operations, system administrators resort to the use of logs, execution traces, and system scanners (e.g., anti-malwares, intrusion detectors, etc.) to diagnose the cause of the anomaly....

Development trend of insider anomaly detection system
2018 Edition, February 1, 2018 - Korea University

Recently, industrial and national infrastructure suffered economic losses due to internal leaks caused by insider leaks and key data leaks. As a result, many companies applying not only physical external and internal penetration methods, but also software, machine learning, and other methods...

Development trend of insider anomaly detection system
2018 Edition, February 1, 2018 - Korea University

Recently, industrial and national infrastructure suffered economic losses due to internal leaks caused by insider leaks and key data leaks. As a result, many companies applying not only physical external and internal penetration methods, but also software, machine learning, and other methods...

Efficient Anomaly Detection System for Mobile Handsets
2008 Edition, August 1, 2008 - IEEE - Institute of Electrical and Electronics Engineers, Inc.

A new anomaly detection system for mobile handsets has been proposed. In this system, software behavior that deviates from a model representing normal behavior is considered to be an anomaly. It is generally impossible to cover software...

PBAD: Perception-Based Anomaly Detection System for Cloud Datacenters
2015 Edition, June 1, 2015 - IEEE - Institute of Electrical and Electronics Engineers, Inc.

Detection of anomalies in large Cloud infrastructure is challenging. Understanding operational behavior of Cloud is extremely difficult due to the heterogeneity of different technologies, virtualized platforms and complex interactions among the systems. Many of existing...

Towards a science of anomaly detection system evasion
2015 Edition, September 1, 2015 - IEEE - Institute of Electrical and Electronics Engineers, Inc.

A fundamental drawback of current anomaly detection systems (ADSs) is the ability of a skilled attacker to evade detection. This is due to the flawed assumption that an attacker does not have any information about an ADS. Advanced persistent...

Android anomaly detection system using machine learning classification
2015 Edition, August 1, 2015 - IEEE - Institute of Electrical and Electronics Engineers, Inc.

Android is one of the most popular open-source smartphone operating system and its access control permission mechanisms cannot detect any malware behavior. In this paper, new software behavior-based anomaly detection system is proposed to detect anomaly...

Advertisement