Keyword : anomaly detection


Improvement of Anomaly Detection Performance Using Packet Flow Regularity in Industrial Control Networks
Kensuke TAMURA Kanta MATSUURA 
Publication:   
Publication Date: 2019/01/01
Vol. E102-A  No. 1 ; pp. 65-73
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
industrial control systemsanomaly detectionnatural language processingmachine learningword2vec
 Summary | Full Text:PDF

Internet Anomaly Detection Based on Complex Network Path
Jinfa WANG Siyuan JIA Hai ZHAO Jiuqiang XU Chuan LIN 
Publication:   
Publication Date: 2018/12/01
Vol. E101-B  No. 12 ; pp. 2397-2408
Type of Manuscript:  PAPER
Category: Internet
Keyword: 
Internetanomaly detectioncomplex networknetwork diameternetwork effective pathnetwork mean shortest path
 Summary | Full Text:PDF

Discrimination of a Resistive Open Using Anomaly Detection of Delay Variation Induced by Transitions on Adjacent Lines
Hiroyuki YOTSUYANAGI Kotaro ISE Masaki HASHIZUME Yoshinobu HIGAMI Hiroshi TAKAHASHI 
Publication:   
Publication Date: 2017/12/01
Vol. E100-A  No. 12 ; pp. 2842-2850
Type of Manuscript:  Special Section PAPER (Special Section on VLSI Design and CAD Algorithms)
Category: 
Keyword: 
resistive opensmall delay faultadjacent linedelay variationanomaly detection
 Summary | Full Text:PDF

A Novel RNN-GBRBM Based Feature Decoder for Anomaly Detection Technology in Industrial Control Network
Hua ZHANG Shixiang ZHU Xiao MA Jun ZHAO Zeng SHOU 
Publication:   
Publication Date: 2017/08/01
Vol. E100-D  No. 8 ; pp. 1780-1789
Type of Manuscript:  Special Section PAPER (Special Section on Information and Communication System Security)
Category: Industrial Control System Security
Keyword: 
anomaly detectionindustrial control networkGBRBMRNN-GBRBMosPCAsemi-supervised
 Summary | Full Text:PDF

Traffic Anomaly Detection Based on Robust Principal Component Analysis Using Periodic Traffic Behavior
Takahiro MATSUDA Tatsuya MORITA Takanori KUDO Tetsuya TAKINE 
Publication:   
Publication Date: 2017/05/01
Vol. E100-B  No. 5 ; pp. 749-761
Type of Manuscript:  PAPER
Category: Network
Keyword: 
principal component analysis (PCA)outlierrobust PCAanomaly detectionminimum covariance determinant (MCD)
 Summary | Full Text:PDF

Detecting Anomalies in Massive Traffic Streams Based on S-Transform Analysis of Summarized Traffic Entropies
Sirikarn PUKKAWANNA Hiroaki HAZEYAMA Youki KADOBAYASHI Suguru YAMAGUCHI 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2015/03/01
Vol. E98-D  No. 3 ; pp. 588-595
Type of Manuscript:  Special Section PAPER (Special Section on the Architectures, Protocols, and Applications for the Future Internet)
Category: Internet Operation and Management
Keyword: 
anomaly detectionsketchentropytime-frequency analysisS-transform
 Summary | Full Text:PDF

Fuzzy Multiple Subspace Fitting for Anomaly Detection
Raissa RELATOR Tsuyoshi KATO Takuma TOMARU Naoya OHTA 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2014/10/01
Vol. E97-D  No. 10 ; pp. 2730-2738
Type of Manuscript:  PAPER
Category: Artificial Intelligence, Data Mining
Keyword: 
fuzzy algorithmsubspace fittingkernel vector subspacekernel affine subspaceanomaly detection
 Summary | Full Text:PDF

Unsupervised Ensemble Anomaly Detection Using Time-Periodic Packet Sampling
Masato UCHIDA Shuichi NAWATA Yu GU Masato TSURU Yuji OIE 
Publication:   IEICE TRANSACTIONS on Communications
Publication Date: 2012/07/01
Vol. E95-B  No. 7 ; pp. 2358-2367
Type of Manuscript:  PAPER
Category: Network Management/Operation
Keyword: 
anomaly detectionpacket sampling
 Summary | Full Text:PDF

Effects of Sampling and Spatio/Temporal Granularity in Traffic Monitoring on Anomaly Detectability
Keisuke ISHIBASHI Ryoichi KAWAHARA Tatsuya MORI Tsuyoshi KONDOH Shoichiro ASANO 
Publication:   IEICE TRANSACTIONS on Communications
Publication Date: 2012/02/01
Vol. E95-B  No. 2 ; pp. 466-476
Type of Manuscript:  PAPER
Category: Internet
Keyword: 
anomaly detectionsamplingspatio/temporal granularityhurst parameter
 Summary | Full Text:PDF

Detecting Stealthy Spreaders by Random Aging Streaming Filters
MyungKeun YOON Shigang CHEN 
Publication:   IEICE TRANSACTIONS on Communications
Publication Date: 2011/08/01
Vol. E94-B  No. 8 ; pp. 2274-2281
Type of Manuscript:  PAPER
Category: Internet
Keyword: 
network securityintrusion detectionspreader detectionport scananomaly detection
 Summary | Full Text:PDF

Drastic Anomaly Detection in Video Using Motion Direction Statistics
Chang LIU Guijin WANG Wenxin NING Xinggang LIN 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2011/08/01
Vol. E94-D  No. 8 ; pp. 1700-1707
Type of Manuscript:  PAPER
Category: Image Recognition, Computer Vision
Keyword: 
visual surveillanceanomaly detectionmotion vectorone-class SVMPCA
 Summary | Full Text:PDF

Anomaly Detection in Electronic Shelf Label Systems
Yulia PONOMARCHUK Dae-Wha SEO 
Publication:   IEICE TRANSACTIONS on Communications
Publication Date: 2011/01/01
Vol. E94-B  No. 1 ; pp. 315-318
Type of Manuscript:  LETTER
Category: Network
Keyword: 
wireless sensor networkswireless network securityDoS attacksjamming attack detectionanomaly detection
 Summary | Full Text:PDF

Evaluation of Anomaly Detection Method Based on Pattern Recognition
Romain FONTUGNE Yosuke HIMURA Kensuke FUKUDA 
Publication:   IEICE TRANSACTIONS on Communications
Publication Date: 2010/02/01
Vol. E93-B  No. 2 ; pp. 328-335
Type of Manuscript:  PAPER
Category: Internet
Keyword: 
anomaly detectionpattern recognitionInternet traffic
 Summary | Full Text:PDF

Unsupervised Anomaly Detection Based on Clustering and Multiple One-Class SVM
Jungsuk SONG Hiroki TAKAKURA Yasuo OKABE Yongjin KWON 
Publication:   IEICE TRANSACTIONS on Communications
Publication Date: 2009/06/01
Vol. E92-B  No. 6 ; pp. 1981-1990
Type of Manuscript:  PAPER
Category: Fundamental Theories for Communications
Keyword: 
intrusion detection systemclusteringone-class SVManomaly detection
 Summary | Full Text:PDF

A Traffic Decomposition and Prediction Method for Detecting and Tracing Network-Wide Anomalies
Ping DU Shunji ABE Yusheng JI Seisho SATO Makio ISHIGURO 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2009/05/01
Vol. E92-D  No. 5 ; pp. 929-936
Type of Manuscript:  Special Section PAPER (Special Section on Information and Communication System Security)
Category: Internet Security
Keyword: 
anomaly detectionanomaly tracingautoregressive (AR) modelKalman filter
 Summary | Full Text:PDF

A Framework for Detection of Traffic Anomalies Based on IP Aggregation
Marat ZHANIKEEV Yoshiaki TANAKA 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2009/01/01
Vol. E92-D  No. 1 ; pp. 16-23
Type of Manuscript:  PAPER
Category: Networks
Keyword: 
traffic analysisIP aggregationanomaly detectionperformance monitoringnetwork management
 Summary | Full Text:PDF

Finding Cardinality Heavy-Hitters in Massive Traffic Data and Its Application to Anomaly Detection
Keisuke ISHIBASHI Tatsuya MORI Ryoichi KAWAHARA Yutaka HIROKAWA Atsushi KOBAYASHI Kimihiro YAMAMOTO Hitoaki SAKAMOTO Shoichiro ASANO 
Publication:   IEICE TRANSACTIONS on Communications
Publication Date: 2008/05/01
Vol. E91-B  No. 5 ; pp. 1331-1339
Type of Manuscript:  Special Section PAPER (Special Section on Communication Quality)
Category: Measurement Methodology for Network Quality Such as IP, TCP and Routing
Keyword: 
cardinalityanomaly detectiondata stream
 Summary | Full Text:PDF

Intrusion Detection by Monitoring System Calls with POSIX Capabilities
Takahiro HARUYAMA Hidenori NAKAZATO Hideyoshi TOMINAGA 
Publication:   IEICE TRANSACTIONS on Communications
Publication Date: 2007/10/01
Vol. E90-B  No. 10 ; pp. 2646-2654
Type of Manuscript:  Special Section PAPER (Special Section on New Challenge for Internet Technology and its Architecture)
Category: 
Keyword: 
anomaly detectionsystem callPOSIX capability
 Summary | Full Text:PDF

Constructing a Multilayered Boundary to Defend against Intrusive Anomalies
Zonghua ZHANG Hong SHEN 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2007/02/01
Vol. E90-D  No. 2 ; pp. 490-499
Type of Manuscript:  PAPER
Category: Application Information Security
Keyword: 
intrusion detectionanomaly detectioninformation securityPOMDP
 Summary | Full Text:PDF

Security Protocols Protection Based on Anomaly Detection
Abdulrahman ALHARBY Hideki IMAI 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2006/01/01
Vol. E89-D  No. 1 ; pp. 189-200
Type of Manuscript:  Special Section PAPER (Special Section on New Technologies and their Applications of the Internet III)
Category: Intrusion Detection
Keyword: 
intrusion detectionsecurity protocolsanomaly detectiondynamic Bayesian network
 Summary | Full Text:PDF

Robust QoS Control System for Mobile Multimedia Communication in IP-Based Cellular Network: Multipath Control and Proactive Control
Akihito OKURA Takeshi IHARA Akira MIURA Masami YABUSAKI 
Publication:   IEICE TRANSACTIONS on Communications
Publication Date: 2005/07/01
Vol. E88-B  No. 7 ; pp. 2784-2793
Type of Manuscript:  Special Section PAPER (Special Section on Mobile Multimedia Communications)
Category: 
Keyword: 
proactive controlmultipath controlanomaly detectionattractorlinear optimizationlinear programming
 Summary | Full Text:PDF

Efficient Masquerade Detection Using SVM Based on Common Command Frequency in Sliding Windows
Han-Sung KIM Sung-Deok CHA 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2004/11/01
Vol. E87-D  No. 11 ; pp. 2446-2452
Type of Manuscript:  PAPER
Category: Application Information Security
Keyword: 
intrusion detectionmasquerade detectionanomaly detectionmachine learningSVM (Support Vector Machine)user command
 Summary | Full Text:PDF

A Clustering-Based Anomaly Intrusion Detector for a Host Computer
Sang Hyun OH Won Suk LEE 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2004/08/01
Vol. E87-D  No. 8 ; pp. 2086-2094
Type of Manuscript:  PAPER
Category: Application Information Security
Keyword: 
intrusion detectionanomaly detectiondata miningclusteringuser profiling
 Summary | Full Text:PDF