Search results for " Anomaly Detection"

showing 9 items of 9 documents

A Clustering approach for profiling LoRaWAN IoT devices

2019

Internet of Things (IoT) devices are starting to play a predominant role in our everyday life. Application systems like Amazon Echo and Google Home allow IoT devices to answer human requests, or trigger some alarms and perform suitable actions. In this scenario, any data information, related device and human interaction are stored in databases and can be used for future analysis and improve the system functionality. Also, IoT information related to the network level (wireless or wired) may be stored in databases and can be processed to improve the technology operation and to detect network anomalies. Acquired data can be also used for profiling operation, in order to group devices according…

050101 languages & linguisticsIoTComputer scienceIoT; LoRa; LoRaWAN; machine learning; k-means; anomaly detection; cluster analysisk-means02 engineering and technologyLoRaSilhouette0202 electrical engineering electronic engineering information engineeringProfiling (information science)Wireless0501 psychology and cognitive sciencesCluster analysisbusiness.industryNetwork packetSettore ING-INF/03 - Telecomunicazioni05 social sciencesk-means clusteringanomaly detectionLoRaWANmachine learning020201 artificial intelligence & image processingAnomaly detectionInternet of ThingsbusinessComputer networkcluster analysis
researchProduct

State of the Art Literature Review on Network Anomaly Detection

2018

As network attacks are evolving along with extreme growth in the amount of data that is present in networks, there is a significant need for faster and more effective anomaly detection methods. Even though current systems perform well when identifying known attacks, previously unknown attacks are still difficult to identify under occurrence. To emphasize, attacks that might have more than one ongoing attack vectors in one network at the same time, or also known as APT (Advanced Persistent Threat) attack, may be hardly notable since it masquerades itself as legitimate traffic. Furthermore, with the help of hiding functionality, this type of attack can even hide in a network for years. Additi…

Advanced persistent threatComputer science05 social sciences050801 communication & media studiesDenial-of-service attack02 engineering and technology021001 nanoscience & nanotechnologyComputer securitycomputer.software_genrenetwork anomaly detection0508 media and communicationsAnomaly detectionState (computer science)tietoturva0210 nano-technologyverkkohyökkäyksetcomputer
researchProduct

A Novel Method for Detecting APT Attacks by Using OODA Loop and Black Swan Theory

2018

Advanced Persistent Threat(APT) attacks are a major concern for the modern societal digital infrastructures due to their highly sophisticated nature. The purpose of these attacks varies from long period espionage in high level environment to causing maximal destruction for targeted cyber environment. Attackers are skilful and well funded by governments in many cases. Due to sophisticated methods it is highly important to study proper countermeasures to detect these attacks as early as possible. Current detection methods under-performs causing situations where an attack can continue months or even years in a targeted environment. We propose a novel method for analysing APT attacks through OO…

Advanced persistent threatNoticeComputer science05 social sciences020206 networking & telecommunicationsOODA loop02 engineering and technologyBlack Swan theoryComputer securitycomputer.software_genreFlow networkBlack swan theorynetwork anomaly detectionLong periodAdvanced Persistent Thread (APT)0502 economics and businessOODA loop0202 electrical engineering electronic engineering information engineeringcomputer050203 business & management
researchProduct

A Novel Deep Learning Stack for APT Detection

2019

We present a novel Deep Learning (DL) stack for detecting Advanced Persistent threat (APT) attacks. This model is based on a theoretical approach where an APT is observed as a multi-vector multi-stage attack with a continuous strategic campaign. To capture these attacks, the entire network flow and particularly raw data must be used as an input for the detection process. By combining different types of tailored DL-methods, it is possible to capture certain types of anomalies and behaviour. Our method essentially breaks down a bigger problem into smaller tasks, tries to solve these sequentially and finally returns a conclusive result. This concept paper outlines, for example, the problems an…

Advanced persistent threatProcess (engineering)Computer science020209 energyDistributed computing02 engineering and technologylcsh:Technologylcsh:ChemistryStack (abstract data type)020204 information systemsAdvanced Persistent Thread (APT)0202 electrical engineering electronic engineering information engineeringGeneral Materials Sciencetietoturvalcsh:QH301-705.5Instrumentationta113Fluid Flow and Transfer Processeslcsh:Tbusiness.industryProcess Chemistry and TechnologyDeep learningGeneral EngineeringFlow networklcsh:QC1-999Computer Science Applicationsnetwork anomaly detectionkoneoppiminenlcsh:Biology (General)lcsh:QD1-999lcsh:TA1-2040Deep Learning (DL)Artificial intelligencelcsh:Engineering (General). Civil engineering (General)Raw databusinessverkkohyökkäyksetlcsh:Physics
researchProduct

State of the Art Literature Review on Network Anomaly Detection with Deep Learning

2018

As network attacks are evolving along with extreme growth in the amount of data that is present in networks, there is a significant need for faster and more effective anomaly detection methods. Even though current systems perform well when identifying known attacks, previously unknown attacks are still difficult to identify under occurrence. To emphasize, attacks that might have more than one ongoing attack vectors in one network at the same time, or also known as APT (Advanced Persistent Threat) attack, may be hardly notable since it masquerades itself as legitimate traffic. Furthermore, with the help of hiding functionality, this type of attack can even hide in a network for years. Additi…

Advanced persistent threatbusiness.industryComputer scienceDeep learningdeep learning020206 networking & telecommunications02 engineering and technologyComputer securitycomputer.software_genrenetwork anomaly detectionkoneoppiminen0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingAnomaly detectionState (computer science)Artificial intelligencetietoturvabusinessverkkohyökkäyksetcomputer
researchProduct

Exploratory approach for network behavior clustering in LoRaWAN

2021

AbstractThe interest in the Internet of Things (IoT) is increasing both as for research and market perspectives. Worldwide, we are witnessing the deployment of several IoT networks for different applications, spanning from home automation to smart cities. The majority of these IoT deployments were quickly set up with the aim of providing connectivity without deeply engineering the infrastructure to optimize the network efficiency and scalability. The interest is now moving towards the analysis of the behavior of such systems in order to characterize and improve their functionality. In these IoT systems, many data related to device and human interactions are stored in databases, as well as I…

IoTGeneral Computer ScienceComputer sciencek-meansReliability (computer networking)02 engineering and technologyLoRaMachine LearningHome automation0202 electrical engineering electronic engineering information engineeringCluster AnalysisWirelessCluster analysisIoT LoRa LoRaWAN Machine Learning k-means Anomaly Detection Cluster AnalysisNetwork packetbusiness.industry020206 networking & telecommunicationsIoT; LoRa; LoRaWAN; Machine Learning; k-means; Anomaly Detection; Cluster AnalysisLoRaWANWireless network interface controllerScalabilityAnomaly Detection020201 artificial intelligence & image processingAnomaly detectionbusinessComputer networkJournal of Ambient Intelligence and Humanized Computing
researchProduct

Semantic anomaly detection in school-aged children during natural sentence reading : A study of fixation-related brain potentials

2018

In this study, we investigated the effects of context-related semantic anomalies on the fixation-related brain potentials of 12–13-year-old Finnish children in grade 6 during sentence reading. The detection of such anomalies is typically reflected in the N400 event-related potential. We also examined whether the representation invoked by the sentence context extends to the orthographic representation level by replacing the final words of the sentence with an anomalous word neighbour of a plausible word. The eye-movement results show that the anomalous word neighbours of plausible words cause similar first-fixation and gaze duration reactions, as do other anomalous words. Similarly, we obser…

MaleEye MovementsPhysiologyVisual SystemSensory Physiologyschool-aged childrenSocial SciencesElectroencephalographylukeminen0302 clinical medicineParietal LobeMedicine and Health SciencesPsychologyAttentionChildEvoked Potentialsta515LanguageClinical NeurophysiologyP600Brain MappingMultidisciplinarymedicine.diagnostic_testQ05 social sciencesRBrainElectroencephalographySensory SystemsSemanticsElectrophysiologyBioassays and Physiological AnalysisBrain ElectrophysiologyPhysical SciencesMedicineAnomaly detectionFemaleAnatomyPsychologySentenceCognitive psychologyResearch ArticleAdolescentImaging TechniquesPermutationScienceNeurophysiologyNeuroimagingResearch and Analysis Methods050105 experimental psychology03 medical and health scienceskouluikäisetreadingmedicineReaction TimeHumanssemantic anomaly detection0501 psychology and cognitive sciencesScalpDiscrete MathematicsElectrophysiological TechniquesCognitive PsychologyBiology and Life SciencesLinguisticsFixation (psychology)Independent component analysisGazeN400Lexical SemanticsCombinatoricsCognitive ScienceConceptual SemanticsClinical MedicineHeadanomaliat030217 neurology & neurosurgeryMathematicsNeurosciencePLoS ONE
researchProduct

Anomaly Detection for Reoccurring Concept Drift in Smart Environments

2022

Many crowdsensing applications today rely on learning algorithms applied to data streams to accurately classify information and events of interest in smart environments. Unfor-tunately, the statistical properties of the input data may change in unexpected ways. As a result, the definition of anomalous and normal data can vary over time and machine learning models may need to be re-trained incrementally. This problem is known as concept drift, and it has often been ignored by anomaly detection systems, resulting in significant performance degradation. In addition, the statistical distribution of past data often tends to repeat itself, and thus old learning models could be reused, avoiding co…

Settore ING-INF/05 - Sistemi Di Elaborazione Delle Informazioniconcept drift online anomaly detection smart city unsupervised learning2022 18th International Conference on Mobility, Sensing and Networking (MSN)
researchProduct

Anomaly Detection in Traffic Surveillance Videos Using Deep Learning

2022

In the recent past, a huge number of cameras have been placed in a variety of public and private areas for the purposes of surveillance, the monitoring of abnormal human actions, and traffic surveillance. The detection and recognition of abnormal activity in a real-world environment is a big challenge, as there can be many types of alarming and abnormal activities, such as theft, violence, and accidents. This research deals with accidents in traffic videos. In the modern world, video traffic surveillance cameras (VTSS) are used for traffic surveillance and monitoring. As the population is increasing drastically, the likelihood of accidents is also increasing. The VTSS is used to detect abno…

VDP::Teknologi: 500Deep LearningAccidents TrafficHumansNeural Networks Computerdeep learning; video classification; accident detection; surveillance system; anomaly detectionCitiesElectrical and Electronic EngineeringBiochemistryInstrumentationAlgorithmsAtomic and Molecular Physics and OpticsAnalytical ChemistrySensors
researchProduct