International Journal of Advance Computational Engineering and Networking (IJACEN)
.
Follow Us On :
current issues
Volume-12,Issue-8  ( Aug, 2024 )
Past issues
  1. Volume-12,Issue-7  ( Jul, 2024 )
  2. Volume-12,Issue-6  ( Jun, 2024 )
  3. Volume-12,Issue-5  ( May, 2024 )
  4. Volume-12,Issue-4  ( Apr, 2024 )
  5. Volume-12,Issue-3  ( Mar, 2024 )
  6. Volume-12,Issue-2  ( Feb, 2024 )
  7. Volume-12,Issue-1  ( Jan, 2024 )
  8. Volume-11,Issue-12  ( Dec, 2023 )
  9. Volume-11,Issue-11  ( Nov, 2023 )
  10. Volume-11,Issue-10  ( Oct, 2023 )

Statistics report
Dec. 2024
Submitted Papers : 80
Accepted Papers : 10
Rejected Papers : 70
Acc. Perc : 12%
Issue Published : 140
Paper Published : 1656
No. of Authors : 4371
  Journal Paper


Paper Title :
Anomaly Extraction In The Network Using Association Rule Mining

Author :Gayatri R. Dahiwadkar, Sayali M. Gaikwad, Sarojani B. Salgar, Bhagyashree B. Sawant, Sanketa S. Sawant

Article Citation :Gayatri R. Dahiwadkar ,Sayali M. Gaikwad ,Sarojani B. Salgar ,Bhagyashree B. Sawant ,Sanketa S. Sawant , (2014 ) " Anomaly Extraction In The Network Using Association Rule Mining " , International Journal of Advance Computational Engineering and Networking (IJACEN) , pp. 34-35, Volume-2,Issue-5

Abstract : Abstract— Anomaly extraction is an important problem essential to several applications ranging from root cause analysis, to attack mitigation, and testing anomaly detectors. Anomaly extraction is preceded by an anomaly detection step, which detects anomalous events and may identify a large set of possible associated event flows. The goal of anomaly extraction is to find and summarize the set of flows that are effectively caused by the anomalous event. In this work, we use metadata provided by several histogram based detectors to identify suspicious flows and then apply association rule mining to find and summarize the event flows. Using rich traffic data from a backbone network, we show that we can reduce the classification cost, in terms of items (flows or rules) that need to be classified, by several orders of magnitude. Further, we show that our techniques effectively isolate event flows in all analyzed cases.

Type : Research paper

Published : Volume-2,Issue-5


DOIONLINE NO - IJACEN-IRAJ-DOIONLINE-736   View Here

Copyright: © Institute of Research and Journals

| PDF |
Viewed - 38
| Published on 2014-05-16
   
   
IRAJ Other Journals
IJACEN updates
Paper Submission is open now for upcoming Issue.
The Conference World

JOURNAL SUPPORTED BY