Skip to main content

Showing 1–2 of 2 results for author: Reed, J W

Searching in archive cs. Search in all archives.
.
  1. arXiv:1710.09422  [pdf, other

    cs.CR cs.DS stat.AP

    Setting the threshold for high throughput detectors: A mathematical approach for ensembles of dynamic, heterogeneous, probabilistic anomaly detectors

    Authors: Robert A. Bridges, Jessie D. Jamieson, Joel W. Reed

    Abstract: Anomaly detection (AD) has garnered ample attention in security research, as such algorithms complement existing signature-based methods but promise detection of never-before-seen attacks. Cyber operations manage a high volume of heterogeneous log data; hence, AD in such operations involves multiple (e.g., per IP, per data type) ensembles of detectors modeling heterogeneous characteristics (e.g.,… ▽ More

    Submitted 25 October, 2017; originally announced October 2017.

    Comments: 11 pages, 5 figures. Proceedings of IEEE Big Data Conference, 2017

  2. arXiv:1602.01130  [pdf, other

    cs.CR stat.ML

    GraphPrints: Towards a Graph Analytic Method for Network Anomaly Detection

    Authors: Christopher R. Harshaw, Robert A. Bridges, Michael D. Iannacone, Joel W. Reed, John R. Goodall

    Abstract: This paper introduces a novel graph-analytic approach for detecting anomalies in network flow data called GraphPrints. Building on foundational network-mining techniques, our method represents time slices of traffic as a graph, then counts graphlets -- small induced subgraphs that describe local topology. By performing outlier detection on the sequence of graphlet counts, anomalous intervals of tr… ▽ More

    Submitted 2 February, 2016; originally announced February 2016.

    Comments: 4 pages submitted to Cyber & Information Security Research Conference 2016, ACM