Please use this identifier to cite or link to this item: https://hdl.handle.net/2440/49351
Citations
Scopus Web of Science® Altmetric
?
?
Full metadata record
DC FieldValueLanguage
dc.contributor.authorRingberg, H.-
dc.contributor.authorRoughan, M.-
dc.contributor.authorRexford, J.-
dc.date.issued2008-
dc.identifier.citationComputer Communications Review, 2008; 38(1):55-59-
dc.identifier.issn0146-4833-
dc.identifier.issn0146-4833-
dc.identifier.urihttp://hdl.handle.net/2440/49351-
dc.descriptionCopyright © 2008 ACM, Inc.-
dc.description.abstract<jats:p>Anomalous events that affect the performance of networks are a fact of life. It is therefore not surprising that recent years have seen an explosion in research on network anomaly detection. What is quite surprising, however, is the lack of controlled evaluation of these detectors. In this paper we argue that there are numerous important questions regarding the effectiveness of anomaly detectors that cannot be answered by the evaluation techniques employed today. We present four central requirements of a rigorous evaluation that can only be met by simulating both the anomaly and its surrounding environment. While simulation is necessary, it is not sufficient. We therefore present an outline of an evaluation methodology that leverages both simulation and traces from operational networks</jats:p>-
dc.description.statementofresponsibilityHaakon Ringberg; Matthew Roughan; Jennifer Rexford-
dc.language.isoen-
dc.publisherAssoc Computing Machinery-
dc.source.urihttp://dx.doi.org/10.1145/1341431.1341443-
dc.titleThe need for simulation in evaluating anomaly detectors-
dc.typeJournal article-
dc.identifier.doi10.1145/1341431.1341443-
pubs.publication-statusPublished-
dc.identifier.orcidRoughan, M. [0000-0002-7882-7329]-
Appears in Collections:Applied Mathematics publications
Aurora harvest 5

Files in This Item:
There are no files associated with this item.


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.