Now showing items 1-10 of 24
Boundary detection in tokenizing network application payload for anomaly detection
Most of the current anomaly detection methods for network traffic rely on the packet header for studying network traffic behavior. We believe that significant information lies in the payload of the packet and hence it is ...
Learning rules for anomaly detection of hostile network traffic
We introduce an algorithm called LERAD that learns rules for finding rare events in nominal time-series data with long range dependencies. We use LERAD to find anomalies in network packets and TCP sessions to detect novel ...
A local search optimization algorithm based on natural principles of gravitation
This paper discusses the concept of an algorithm designed to locate the optimal solution to a problem in a (presumably) very large solution space. The algorithm attempts to locate the optimal solution to the problem by ...
A machine learning approach to anomaly detection
Strategies for testing web applications from the client side
This thesis is presented on the testing of computer software designed to operate over the World Wide Web. A fault model to guide Web software testing is developed, the components of Web software applications and their ...
HEAT: runtime interception of Win32 functions
When researching in any field, it is always important to build upon existing work. In most research disciplines, the core base is well defined and widely documented. However, the basis of innovative research in computer ...
Learning states and rules for time series anomaly detection
In this paper, we investigate machine learning techniques for discovering knowledge that can be used to monitor the operation of devices or systems. Specifically, we study methods for generating models that can detect ...
A taxonomy of e-commerce risks and failures
Imagine being asked to test an e-commerce website. If you haven't tested one before, where would you start? What experience would you draw on? Where would you look for more information? Even very experienced testers have ...
Pair programming to facilitate the training of newly-hired programmers
Pair programming is touted by some software professionals as a style which allows developers to produce superior code in less time, and with fewer defects, than code produced by individuals. However, the acclaim for the ...
An algorithm for clearing combinatorial markets
It was recently shown possible to solve single item auctions without revealing any secret except for the solution. Namely, with vMB-share , the seller and the buyer only learn each other's identity and the selling price ...