Tesi sul tema "Networks anomalies detection"
Cita una fonte nei formati APA, MLA, Chicago, Harvard e in molti altri stili
Vedi i top-50 saggi (tesi di laurea o di dottorato) per l'attività di ricerca sul tema "Networks anomalies detection".
Accanto a ogni fonte nell'elenco di riferimenti c'è un pulsante "Aggiungi alla bibliografia". Premilo e genereremo automaticamente la citazione bibliografica dell'opera scelta nello stile citazionale di cui hai bisogno: APA, MLA, Harvard, Chicago, Vancouver ecc.
Puoi anche scaricare il testo completo della pubblicazione scientifica nel formato .pdf e leggere online l'abstract (il sommario) dell'opera se è presente nei metadati.
Vedi le tesi di molte aree scientifiche e compila una bibliografia corretta.
Sithirasenan, Elankayer. "Substantiating Anomalies in Wireless Networks Using Outlier Detection Techniques". Thesis, Griffith University, 2009. http://hdl.handle.net/10072/365690.
Testo completoThesis (PhD Doctorate)
Doctor of Philosophy (PhD)
School of Information and Communication Technology
Science, Environment, Engineering and Technology
Full Text
Abuaitah, Giovani Rimon. "ANOMALIES IN SENSOR NETWORK DEPLOYMENTS: ANALYSIS, MODELING, AND DETECTION". Wright State University / OhioLINK, 2013. http://rave.ohiolink.edu/etdc/view?acc_num=wright1376594068.
Testo completoVerner, Alexander. "LSTM Networks for Detection and Classification of Anomalies in Raw Sensor Data". Diss., NSUWorks, 2019. https://nsuworks.nova.edu/gscis_etd/1074.
Testo completoKamat, Sai Shyamsunder. "Analyzing Radial Basis Function Neural Networks for predicting anomalies in Intrusion Detection Systems". Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-259187.
Testo completoI det 21: a århundradet är information den nya valutan. Med allnärvaro av enheter anslutna till internet har mänskligheten tillgång till information inom ett ögonblick. Det finns dock vissa grupper som använder metoder för att stjäla information för personlig vinst via internet. Ett intrångsdetekteringssystem (IDS) övervakar ett nätverk för misstänkta aktiviteter och varnar dess ägare om ett oönskat intrång skett. Kommersiella IDS reagerar efter detekteringen av ett intrångsförsök. Angreppen blir alltmer komplexa och det kan vara dyrt att vänta på att attackerna ska ske för att reagera senare. Det är avgörande för nätverksägare att använda IDS:er som på ett förebyggande sätt kan skilja på oskadlig dataanvändning från skadlig. Maskininlärning kan lösa detta problem. Den kan analysera all befintliga data om internettrafik, känna igen mönster och förutse användarnas beteende. Detta projekt syftar till att studera hur effektivt Radial Basis Function Neural Networks (RBFN) med Djupinlärnings arkitektur kan påverka intrångsdetektering. Från detta perspektiv ställs frågan hur väl en RBFN kan förutsäga skadliga intrångsförsök, särskilt i jämförelse med befintliga detektionsmetoder.Här är RBFN definierad som en flera-lagers neuralt nätverksmodell som använder en radiell grundfunktion för att omvandla data till linjärt separerbar. Efter en undersökning av modern litteratur och lokalisering av ett namngivet dataset användes kvantitativ forskningsmetodik med prestanda indikatorer för att utvärdera RBFN: s prestanda. En Random Forest Classifier algorithm användes också för jämförelse. Resultaten erhölls efter en serie finjusteringar av parametrar på modellerna. Resultaten visar att RBFN är korrekt när den förutsäger avvikande internetbeteende i genomsnitt 80% av tiden. Andra algoritmer i litteraturen beskrivs som mer än 90% korrekta. Den föreslagna RBFN-modellen är emellertid mycket exakt när man registrerar specifika typer av attacker som Port Scans och BotNet malware. Resultatet av projektet visar att den föreslagna metoden är allvarligt påverkad av begränsningar. T.ex. så behöver modellen finjusteras över flera försök för att uppnå önskad noggrannhet. En möjlig lösning är att begränsa denna modell till att endast förutsäga malware-attacker och använda andra maskininlärnings-algoritmer för andra attacker.
Kabore, Raogo. "Hybrid deep neural network anomaly detection system for SCADA networks". Thesis, Ecole nationale supérieure Mines-Télécom Atlantique Bretagne Pays de la Loire, 2020. http://www.theses.fr/2020IMTA0190.
Testo completoSCADA systems are more and more targeted by cyber-attacks because of many vulnerabilities inhardware, software, protocols and the communication stack. Those systems nowadays use standard hardware, software, operating systems and protocols. Furthermore, SCADA systems which used to be air-gaped are now interconnected to corporate networks and to the Internet, widening the attack surface.In this thesis, we are using a deep learning approach to propose an efficient hybrid deep neural network for anomaly detection in SCADA systems. The salient features of SCADA data are automatically and unsupervisingly learnt, and then fed to a supervised classifier in order to dertermine if those data are normal or abnormal, i.e if there is a cyber-attack or not. Afterwards, as a response to the challenge caused by high training time of deep learning models, we proposed a distributed approach of our anomaly detection system in order lo lessen the training time of our model
Jin, Fang. "Algorithms for Modeling Mass Movements and their Adoption in Social Networks". Diss., Virginia Tech, 2016. http://hdl.handle.net/10919/72292.
Testo completoPh. D.
Mdini, Maha. "Anomaly detection and root cause diagnosis in cellular networks". Thesis, Ecole nationale supérieure Mines-Télécom Atlantique Bretagne Pays de la Loire, 2019. http://www.theses.fr/2019IMTA0144/document.
Testo completoWith the evolution of automation and artificial intelligence tools, mobile networks havebecome more and more machine reliant. Today, a large part of their management tasks runs inan autonomous way, without human intervention. In this thesis, we have focused on takingadvantage of the data analysis tools to automate the troubleshooting task and carry it to a deeperlevel. To do so, we have defined two main objectives: anomaly detection and root causediagnosis. The first objective is about detecting issues in the network automatically withoutincluding expert knowledge. To meet this objective, we have proposed an algorithm, WatchmenAnomaly Detection (WAD), based on pattern recognition. It learns patterns from periodic timeseries and detect distortions in the flow of new data. The second objective aims at identifying theroot cause of issues without any prior knowledge about the network topology and services. Toaddress this question, we have designed an algorithm, Automatic Root Cause Diagnosis (ARCD)that identifies the roots of network issues. ARCD is composed of two independent threads: MajorContributor identification and Incompatibility detection. WAD and ARCD have been proven to beeffective. However, many improvements of these algorithms are possible
Moussa, Mohamed Ali. "Data gathering and anomaly detection in wireless sensors networks". Thesis, Paris Est, 2017. http://www.theses.fr/2017PESC1082/document.
Testo completoThe use of Wireless Sensor Networks (WSN)s is steadily increasing to cover various applications and domains. This trend is supported by the technical advancements in sensor manufacturing process which allow a considerable reduction in the cost and size of these components. However, there are several challenges facing the deployment and the good functioning of this type of networks. Indeed, WSN's applications have to deal with the limited energy, memory and processing capacities of sensor nodes as well as the imperfection of the probed data. This dissertation addresses the problem of collecting data and detecting anomalies in WSNs. The aforementioned functionality needs to be achieved while ensuring a reliable data quality at the collector node, a good anomaly detection accuracy, a low false alarm rate as well as an efficient energy consumption solution. Throughout this work, we provide different solutions that allow to meet these requirements. Foremost, we propose a Compressive Sensing (CS) based solution that allows to equilibrate the traffic carried by nodes regardless their distance from the sink. This solution promotes a larger lifespan of the WSN since it balances the energy consumption between sensor nodes. Our approach differs from existing CS-based solutions by taking into account the sparsity of sensory representation in the temporal domain in addition to the spatial dimension. Moreover, we propose a new formulation to detect aberrant readings. The simulations carried on real datasets prove the efficiency of our approach in terms of data recovering and anomaly detection compared to existing solutions. Aiming to further optimize the use of WSN resources, we propose in our second contribution a Matrix Completion (MC) based data gathering and anomaly detection solution where an arbitrary subset of nodes contributes at the data gathering process at each operating period. To fill the missing values, we mainly relay on the low rank structure of sensory data as well as the sparsity of readings in some transform domain. The developed algorithm also allows to dissemble anomalies from the normal data structure. This solution is enhanced in our third contribution where we propose a constrained formulation of the data gathering and anomalies detection problem. We reformulate the textit{a prior} knowledge about the target data as hard convex constraints. Thus, the involved parameters into the developed algorithm become easy to adjust since they are related to some physical properties of the treated data. Both MC based approaches are tested on real datasets and demonstrate good capabilities in terms of data reconstruction quality and anomaly detection performance. Finally, we propose in the last contribution a position based compressive data gathering scheme where nodes cooperate to compute and transmit only the relevant positions of their sensory sparse representation. This technique provide an efficient tool to deal with the noisy nature of WSN environment as well as detecting spikes in the sensory data. Furthermore, we validate the efficiency of our solution by a theoretical analysis and corroborate it by a simulation evaluation
Audibert, Julien. "Unsupervised anomaly detection in time-series". Electronic Thesis or Diss., Sorbonne université, 2021. http://www.theses.fr/2021SORUS358.
Testo completoAnomaly detection in multivariate time series is a major issue in many fields. The increasing complexity of systems and the explosion of the amount of data have made its automation indispensable. This thesis proposes an unsupervised method for anomaly detection in multivariate time series called USAD. However, deep neural network methods suffer from a limitation in their ability to extract features from the data since they only rely on local information. To improve the performance of these methods, this thesis presents a feature engineering strategy that introduces non-local information. Finally, this thesis proposes a comparison of sixteen time series anomaly detection methods to understand whether the explosion in complexity of neural network methods proposed in the current literature is really necessary
Orman, Keziban. "Contribution to the interpretation of evolving communities in complex networks : Application to the study of social interactions". Thesis, Lyon, INSA, 2014. http://www.theses.fr/2014ISAL0072/document.
Testo completoComplex Networks constitute a convenient tool to model real-world complex systems. For this reason, they have become very popular in the last decade. Many tools exist to study complex networks. Among them, community detection is one of the most important. A community is roughly defined as a group of nodes more connected internally than to the rest of the network. In the literature, this intuitive definition has been formalized in many ways, leading to countless different methods and variants to detect communities. In the large majority of cases, the result of these methods is set of node groups in which each node group corresponds to a community. From the applicative point of view, the meaning of these groups is as important as their detection. However, although the task of detecting communities in itself took a lot of attraction, the problem of interpreting them has not been properly tackled until now. In this thesis, we see the interpretation of communities as a problem independent from the community detection process, consisting in identifying the most characteristic features of communities. We break it down into two sub-problems: 1) finding an appropriate way to represent a community and 2) objectively selecting the most characteristic parts of this representation. To solve them, we take advantage of the information encoded in dynamic attributed networks. We propose a new representation of communities under the form of temporal sequences of topological measures and attribute values associated to individual nodes. We then look for emergent sequential patterns in this dataset, in order to identify the most characteristic community features. We perform a validation of our framework on artificially generated dynamic attributed networks. At this occasion, we study its behavior relatively to changes in the temporal evolution of the communities, and to the distribution and evolution of nodal features. We also apply our framework to real-world systems: a DBLP network of scientific collaborations, and a LastFM network of social and musical interactions. Our results show that the detected communities are not completely homogeneous, in the sense several node topic or interests can be identified for a given community. Some communities are composed of smaller groups of nodes which tend to evolve together as time goes by, be it in terms of individual (attributes, topological measures) or relational (community migration) features. The detected anomalies generally fit some generic profiles: nodes misplaced by the community detection tool, nodes relatively similar to their communities, but also significantly different on certain features and/or not synchronized with their community evolution, and finally nodes with completely different interests
Yellapragada, Ramani. "Probabilistic Model for Detecting Network Traffic Anomalies". Ohio University / OhioLINK, 2004. http://rave.ohiolink.edu/etdc/view?acc_num=ohiou1088538020.
Testo completoNguyen, Ngoc Tan. "A Security Monitoring Plane for Information Centric Networking : application to Named Data Networking". Thesis, Troyes, 2018. http://www.theses.fr/2018TROY0020.
Testo completoThe current architecture of the Internet has been designed to connect remote hosts. But the evolution of its usage, which is now similar to that of a global platform for content distribution undermines its original communication model. In order to bring consistency between the Internet's architecture with its use, new content-oriented network architectures have been proposed, and these are now ready to be implemented. The issues of their management, deployment, and security now arise as locks essential to lift for Internet operators. In this thesis, we propose a security monitoring plan for Named Data Networking (NDN), the most advanced architecture which also benefits from a functional implementation. In this context, we have characterized the most important NDN attacks - Interest Flooding Attack (IFA) and Content Poisoning Attack (CPA) - under real deployment conditions. These results have led to the development of micro-detector-based attack detection solutions leveraging hypothesis testing theory. The approach allows the design of an optimal (AUMP) test capable of providing a desired false alarm probability (PFA) by maximizing the detection power. We have integrated these micro-detectors into a security monitoring plan to detect abnormal changes and correlate them through a Bayesian network, which can identify events impacting security in an NDN node. This proposal has been validated by simulation and experimentation on IFA and CPA attacks
Legrand, Adrien. "Détection, anticipation, action face aux risques dans les bâtiments connectés". Electronic Thesis or Diss., Amiens, 2019. http://www.theses.fr/2019AMIE0058.
Testo completoThis thesis aims to exploit the future mass of data that will emerge from the large number of connected objects to come. Focusing on data from connected buildings, this work aims to contribute to a generic anomaly detection system. The first year was devoted to defining the problem, the context and identifying the candidate models. The path of autoencoder neural networks has been selected and justified by a first experiment. A second, more consistent experiment, taking more into account the temporal aspect and dealing with all classes of anomalies was conducted in the second year. This experiment aims to study the improvements that recurrence can bring in response to convolution within an autoencoder used in connected buildings. The results of this study were presented and published in an IEEE conference on IoT in Egypt. The last year was devoted to improving the use of auto-encoder by proposing to include an estimate of uncertainty in the original operation of the auto-encoder. These tests, conducted on various known datasets initially and then on a connected building dataset later, showed improved performance and were published in an IEEE IA conference
Ben, Chaabene Nour El Houda. "Détection d'utilisateurs violents et de menaces dans les réseaux sociaux". Electronic Thesis or Diss., Institut polytechnique de Paris, 2022. http://www.theses.fr/2022IPPAS001.
Testo completoOnline social networks are an integral part of people's daily social activity. They provide platforms to connect people from all over the world and share their interests. Recent statistics indicate that 56% of the world's population use these social media. However, these network services have also had many negative impacts and the existence of phenomena of aggression and intimidation in these spaces is inevitable and must therefore be addressed. Exploring the complex structure of social networks to detect violent behavior and threats is a challenge for data mining, machine learning, and artificial intelligence. In this thesis work, we aim to propose new approaches for the detection of violent behavior in social networks. Our approaches attempt to resolve this problem for several practical reasons. First, different people have different ways of expressing the same violent behavior. It is desirable to design an approach that works for everyone because of the variety of behaviors and the various ways in which they are expressed. Second, the approaches must have a way to detect potential unseen abnormal behaviors and automatically add them to the training set. Third, the multimodality and multidimensionality of the data available on social networking sites must be taken into account for the development of data mining solutions that will be able to extract relevant information useful for the detection of violent behavior. Finally, approaches must consider the time-varying nature of networks to process new users and links and automatically update built models. In the light of this and to achieve the aforementioned objectives, the main contributions of this thesis are as follows: - The first contribution proposes a model for detecting violent behavior on Twitter. This model supports the dynamic nature of the network and is capable of extracting and analyzing heterogeneous data. - The second contribution introduces an approach for detecting atypical behaviors on a multidimensional network. This approach is based on the exploration and analysis of the relationships between the individuals present on this multidimensional social structure. - The third contribution presents a framework for identifying abnormal people. This intelligent framework is based on the exploitation of a multidimensional model which takes as input multimodal data coming from several sources, capable of automatically enriching the learning set by the violent behaviors detected and considers the dynamicity of the data in order to detect new violent behaviors that appear on the network. This thesis describes achievements combining data mining techniques with new machine learning techniques. To prove the performance of our experimental results, we sums based on real data taken from three popular social networks
Caulkins, Bruce. "SESSION-BASED INTRUSION DETECTION SYSTEM TO MAP ANOMALOUS NETWORK TRAFFIC". Doctoral diss., University of Central Florida, 2005. http://digital.library.ucf.edu/cdm/ref/collection/ETD/id/3466.
Testo completoPh.D.
Other
Arts and Sciences
Modeling and Simulation
Wilmet, Audrey. "Détection d'anomalies dans les flots de liens : combiner les caractéristiques structurelles et temporelles". Electronic Thesis or Diss., Sorbonne université, 2019. http://www.theses.fr/2019SORUS402.
Testo completoA link stream is a set of links {(t, u, v)} in which a triplet (t, u, v) models the interaction between two entities u and v at time t. In many situations, data result from the measurement of interactions between several million of entities over time and can thus be studied through the link stream's formalism. This is the case, for instance, of phone calls, email exchanges, money transfers, contacts between individuals, IP traffic, online shopping, and many more. The goal of this thesis is the detection of sets of abnormal links in a link stream. In a first part, we design a method that constructs different contexts, a context being a set of characteristics describing the circumstances of an anomaly. These contexts allow us to find unexpected behaviors that are relevant, according to several dimensions and perspectives. In a second part, we design a method to detect anomalies in heterogeneous distributions whose behavior is constant over time, by comparing a sequence of similar heterogeneous distributions. We apply our methodological tools to temporal interactions coming from retweets of Twitter and IP traffic of MAWI group
Boudargham, Nadine. "Competent QoS-aware and energy efficient protocols for body sensor networks". Thesis, Bourgogne Franche-Comté, 2020. http://www.theses.fr/2020UBFCD007.
Testo completoBody Sensor Networks (BSNs) are formed of medical sensors that gather physiological and activity data from the human body and its environment, and send them wirelessly to a personal device like Personal Digital Assistant (PDA) or a smartphone that acts as a gateway to health care. Collaborative Body Sensor Networks (CBSNs) are collection of BSNs that move in a given area and collaborate, interact and exchange data between each other to identify group activity, and monitor the status of single and multiple persons.In both BSN and CBNS networks, sending data with the highest Quality of Service (QoS) and performance metrics is crucial since the data sent affects people’s life. For instance, the sensed physiological data should be sent reliably and with minimal delay to take appropriate actions before it is too late, and the energy consumption of nodes should be preserved as they have limited capacities and they are expected to serve for a long period of time. The QoS in BSNs and CBSNs largely depends on the choice of the Medium Access Control (MAC) protocols, the adopted routing schemes, and the efficient and accuracy of anomaly detection.The current MAC, routing and anomaly detection schemes proposed for BSNs and CBSNs in the literature present many limitations and open the door toward more research and propositions in these areas. Thus this thesis work focuses on three main axes. The first axe consists in studying and designing new and robust MAC algorithms able to address BSNs and CBSNs' challenges. Standard MAC protocols are compared in high traffic BSNs and a new MAC protocol is proposed for such environments; then an emergency aware MAC scheme is presented to address the dynamic traffic requirements of BSN in ensuring delivery of emergency data within strict delay requirements, and energy efficiency of nodes during regular observations; moreover, a traffic and mobility aware MAC scheme is proposed for CBSNs to address both traffic and mobility requirements for these networks.The second axe consists in proposing a thorough and efficient routing scheme suitable for BSNs and CBSNs. First, different routing models are compared for CBSNs and a new routing scheme is proposed in the aim of reducing the delay of data delivery, and increasing the network throughput and the energy efficiency of nodes. The proposed scheme is then adapted to BSN's requirements to become a solid solution for the challenges faced by this network. The third axe involves proposing an adaptive sampling approach that guarantees high accuracy in the detection of emergency cases, while ensuring at the same time high energy efficiency of the sensors.In the three axes, the performance of the proposed schemes is qualitatively compared to existing algorithms in the literature; then simulations are carried a posteriori with respect to different performance metrics and under different scenarios to assess their efficiency and ability to face BSNs and CBSNs' challenges.Simulation results demonstrate that the proposed MAC, routing and anomaly detection schemes outperform the existing algorithms, and present strong solutions that satisfy BSNs and CBSNs' requirements
Sölch, Maximilian. "Detecting anomalies in robot time series data using stochastic recurrent networks". Thesis, KTH, Optimeringslära och systemteori, 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-180473.
Testo completoDetta arbete förslår en ny detektionsalgoritm för anomalier i högdi-mensionell multimodal reellvärd tidsseriedata. Metoden kräver in-gen domänkunskap och baseras på Stochastic Recurrent Networks (STORNs), en teknik för oövervakad och universell fördelningssapprox-imation för sekventiell data som bygger på Recurrent Neural Net-works (RNNs) och Variational Auto-Encoders (VAEs). Algoritmen utvärderades på robotgenererade tidsserier och slutsat-sen är att metoden på ett robust sätt upptäcker anomalier både offline och online.
Anomaliedetektion in Roboterzeitreihen mittels stochastischer Rekurrenter Netzwerke In dieser Arbeit wird ein neuartiger Algorithmus entwickelt, um in hochdimensionalen, multimodalen, reellwertigen Zeitreihen Anomalien zu detektieren. Der Ansatz benötigt keine domänenspezifisches Fachwissen und basiert auf Stochastischen Rekurrenten Netzwerken (STORN), einem universellen Wahrscheinlichkeitsverteilungsapproximator für sequenzielle Daten, der die Stärken von Rekurrenten Neuronalen Netzwerken (RNN) und dem Variational Auto-Encoder (VAE) vereinigt. Der Detektionsalgorithmus wird auf realen Robotertrajektorien evaluiert. Es wird gezeigt, dass Anomalien robust online und offline gefunden werden können.
Berti, Matteo. "Anomalous Activity Detection with Temporal Convolutional Networks in HPC Systems". Master's thesis, Alma Mater Studiorum - Università di Bologna, 2020. http://amslaurea.unibo.it/22185/.
Testo completoRamadas, Manikantan. "Detecting Anomalous Network Traffic With Self-Organizing Maps". Ohio University / OhioLINK, 2003. http://rave.ohiolink.edu/etdc/view?acc_num=ohiou1049472005.
Testo completoTadros, Antoine. "Statistical background modeling and applications in remote sensing". Electronic Thesis or Diss., université Paris-Saclay, 2023. http://www.theses.fr/2023UPASM031.
Testo completoThis thesis addresses some problems in remote sensing and statistical background modeling using the a-contrario theory and artificial neural network models. The work is motivated by two applications in remote sensing where the control of false alarms is an issue due to the large-scale nature of the problems.The identification and measuring of oil depots using satellite images has important commercial and strategic value. Here is addressed the former: the detection of oil storage sites while analyzing vast quantities of satellite images covering a whole country or continent. In this context, to be useful an algorithm needs to achieve a high recall while controlling the number of false detections and with a reduced computational cost. The first method proposed here starts by detecting circular objects, which are then clustered using the a-contrario framework; indeed, oil depots often correspond to a dense group of cylindrical buildings. The approach is completed by an a-contrario patch-matching procedure to recover the missing tanks. Since the method relies heavily on the detection of circular objects, several algorithms for detecting circles in low-resolution satellite images are compared. The a-contrario algorithm is also compared to two neural-network architectures for oil depot segmentation.The second remote sensing application is the detection of hot spots in the daytime using multi-band satellite images that do not have thermal bands. This allows the monitoring of the activity of oil refineries, cement works, and steel mills as well as the activities of volcanoes.The first proposed method is based on an anomaly detection algorithm.A second approach relies on measuring the fitness of the measured radiances in the selected spectral bands to the black body model.Finally, this thesis deals with out-of-distribution (OOD) detection in deep learning methods. A first approach is to supplement the training dataset with extraneous data assigned to an additional out-of-distribution class. Training the model on a segregated dataset helps the model to discriminate out-of-distribution samples, including those the model was never exposed to during training. An unsupervised approach to OOD detection is also presented. For that, a new neural network layer is proposed that enforces a Gaussian embedding for each class. Using this new layer, each target class can be represented by a Gaussian distribution. New samples are then evaluated as belonging to a target class or not by performing a chi-square test for each one. Samples rejected by all tests are considered OOD. This methodology also allows to identify ambiguous samples when validated by more than one class
Salhi, Emna. "Detection and localization of link-level network anomalies using end-to-end path monitoring". Phd thesis, Université Rennes 1, 2013. http://tel.archives-ouvertes.fr/tel-00860397.
Testo completoKhasgiwala, Jitesh. "Analysis of Time-Based Approach for Detecting Anomalous Network Traffic". Ohio University / OhioLINK, 2005. http://www.ohiolink.edu/etd/view.cgi?ohiou1113583042.
Testo completoLekscha, Jaqueline Stefanie. "Complex systems methods for detecting dynamical anomalies in past climate variability". Doctoral thesis, Humboldt-Universität zu Berlin, 2020. http://dx.doi.org/10.18452/21047.
Testo completoStudying palaeoclimate proxy data from archives such as tree rings, lake sediments, speleothems, and ice cores using windowed recurrence network analysis offers the possibility to characterise dynamical anomalies in past climate variability. This thesis aims at developing a more reliable framework of windowed recurrence network analysis by comparing different phase space reconstruction approaches for non-uniformly sampled noisy data and by tackling the problem of increased numbers of false positive significant points when correlations within the analysis results can not be neglected. For this, different phase space reconstruction approaches are systematically compared and a generalised areawise significance test which implements a numerical estimation of the correlations within the analysis results is introduced. In particular, the test can be used to identify patches of possibly false positive significant points. The developed analysis framework is applied to detect and characterise dynamical anomalies in past climate variability in North and South America by studying four real-world palaeoclimatic time series from different archives. Furthermore, the question whether palaeoclimate proxy time series from different archives are equally well suited for tracking past climate dynamics with windowed recurrence network analysis is approached by using the framework of proxy system modelling. This thesis promotes the use of non-linear methods for analysing palaeoclimate proxy time series, provides a detailed assessment of potentials and limitations of windowed recurrence network analysis and identifies future research directions that can complement the obtained results and conclusions.
Maudoux, Christophe. "Vers l’automatisation de la détection d’anomalies réseaux". Electronic Thesis or Diss., Paris, HESAM, 2024. http://www.theses.fr/2024HESAC009.
Testo completoWe live in a hyperconnected world. Currently, the majority of the objects surrounding us exchangedata either among themselves or with a server. These exchanges consequently generate networkactivity. It is the study of this network activity that interests us here and forms the focus of thisthesis. Indeed, all messages and thus the network traffic generated by these devices are intentionaland therefore legitimate. Consequently, it is perfectly formatted and known. Alongside this traffic,which can be termed ”normal,” there may exist traffic that does not adhere to expected criteria. Thesenon-conforming exchanges can be categorized as ”abnormal” traffic. This illegitimate traffic can bedue to several internal and external causes. Firstly, for purely commercial reasons, most of theseconnected devices (phones, watches, locks, cameras, etc.) are poorly, inadequately, or not protectedat all. Consequently, they have become prime targets for cybercriminals. Once compromised, thesecommunicating devices form networks capable of launching coordinated attacks : botnets. The trafficinduced by these attacks or the internal synchronization communications within these botnets thengenerates illegitimate traffic that needs to be detected. Our first contribution aims to highlight theseinternal exchanges, specific to botnets. Abnormal traffic can also be generated when unforeseen orextraordinary external events occur, such as incidents or changes in user behavior. These events canimpact the characteristics of the exchanged traffic flows, such as their volume, sources, destinations,or the network parameters that characterize them. Detecting these variations in network activity orthe fluctuation of these characteristics is the focus of our subsequent contributions. This involves aframework and resulting methodology that automates the detection of these network anomalies andpotentially raises real-time alerts
Lalem, Farid. "Cadre méthodologique et applicatif pour le développement de réseaux de capteurs fiables". Thesis, Brest, 2017. http://www.theses.fr/2017BRES0063/document.
Testo completoWireless sensor networks emerge as an innovative technology that can revolutionize and improve our way to live, work and interact with the physical environment around us. Nevertheless, the use of such technology raises new challenges in the development of reliable and secure systems. These wireless sensor networks are often characterized by dense deployment on a large scale in resource-onstrained environments. The constraints imposed are the limitation of the processing, storage and especially energy capacities since they are generally powered by batteries.Our main objective is to propose solutions that guarantee a certain level of reliability in a WSN dedicated to sensitive applications. We have thus proposed three axes, which are:- The development of methods for detecting failed sensor nodes in a WSN.- The development of methods for detecting anomalies in measurements collected by sensor nodes, and subsequently fault sensors (providing false measurements).- The development of methods ensuring the integrity and authenticity of transmitted data over a WSN
Cao, Feng. "Classification, detection and prediction of adverse and anomalous events in medical robots". Case Western Reserve University School of Graduate Studies / OhioLINK, 2012. http://rave.ohiolink.edu/etdc/view?acc_num=case1339166738.
Testo completoCastellazzi, Nicolò. "Analisi di immagini per l'identificazione automatica di anomalie superficiali in ambito industriale". Master's thesis, Alma Mater Studiorum - Università di Bologna, 2020.
Cerca il testo completoJulien, Laureline. "Microvascular network of the retina : 1D model, microfluidic device and high resolutional data for the detection of vascular anomalies". Electronic Thesis or Diss., Sorbonne université, 2023. https://accesdistant.sorbonne-universite.fr/login?url=https://theses-intra.sorbonne-universite.fr/2023SORUS719.pdf.
Testo completoThis thesis focuses on modeling the microvascular network of the retina to investigate circulatory processes in both the healthy retina and in the presence of retinopathies, bridging the gap between numerical modeling, experimental approaches, and clinical data. The retinal network offers the unique advantage of being the only non-invasively accessible microvascular network for in-vivo studies in the human body. We are currently experiencing significant advancements in the field of retinal imaging, with increased precision in morphometric and blood flow imaging, providing insights into the vascular status within the eye and the broader microvascular system. Furthermore, these data serve as a valuable resource for modeling, which complements clinical studies of the retina by providing access to parameters that cannot be measured throughout the entire network and enabling the simulation of controlled disturbances or pathologies. Cardiovascular pathologies can induce modifications in microvascular networks through alterations in biological processes and hemodynamic conditions. Associated clinical observations reveal anomalies in local morphometry and network topology. These vascular anomalies can lead to significant variations in blood flow, as there is a strong interaction between hemodynamics and morphology at the microvascular scale, causing changes in oxygenation and functional capacities. The discrete distribution of red blood cells and nutrients within the network is crucial for proper organ function. This distribution, guided by the network's topology, is the result of many complex nonlinear phenomena. A better understanding of what occurs at the microvascular level would be of significant interest in measuring the hemodynamic repercussions of a local anomaly and, more broadly, a pathology, which could enhance early detection and management. In this thesis, we present two types of approaches on the subject : one is a numerical modeling approach where we focus on the distribution of flow within the network using a continuous blood approach, and the other is an experimental modeling approach where we concentrate on the distribution of red blood cells using a discrete blood approach. For both modeling approaches, clinical morphometric images serve as the foundation for constructing the network, a crucial step in the study of such systems. Initially, we developed a patient-specific one-dimensional model of arteriolar circulation in the retina. Our model is based on the principles of conservation and utilizes blood flow imaging data to impose realistic boundary conditions. To validate our model, we conducted a sensitivity analysis and compared its results to data from the literature. Overall, our model serves as a tool to explore the dynamics of retinal blood flow and its potential clinical implications. An application for cases of single and multiple stenoses is presented in the final section. In parallel, we developed a microfluidic device that replicates the retinal arterial network. The experiments conducted provide data on the chip's resistance and blood flow throughout the network filled with blood, enabling comparison with the model's results. Furthermore, it yields new data on the distribution of red blood cells in a large network, offering insights for enhancing existing mathematical laws for modeling viscosity and red blood cell distribution
Marchetti, Milo. "Rilevazione di anomalie da immagini mediante deep-learning". Master's thesis, Alma Mater Studiorum - Università di Bologna, 2022. http://amslaurea.unibo.it/25041/.
Testo completoLeichtnam, Laetitia. "Detecting and visualizing anomalies in heterogeneous network events : Modeling events as graph structures and detecting communities and novelties with machine learning". Thesis, CentraleSupélec, 2020. http://www.theses.fr/2020CSUP0011.
Testo completoThe general objective of this thesis is to evaluate the interest of graph structures in the field of security data analysis.We propose an end-to-end approach consisting in a unified view of the network data in the form of graphs, a community discovery system, an unsupervised anomaly detection system, and a visualization of the data in the form of graphs. The unified view is obtained using knowledge graphs to represent heterogeneous log files and network traffics. Community detection allows us to select sub-graphs representing events that are strongly related to an alert or an IoC and that are thus relevant for forensic analysis. Our anomaly-based intrusion detection system relies on novelty detection by an autoencoder and exhibits very good results on CICIDS 2017 and 2018 datasets. Finally, an immersive visualization of security data allows highlighting the relations between security elements and malicious events or IOCs. This gives the security analyst a good starting point to explore the data and reconstruct global attack scenarii
Garcia, Font Víctor. "Anomaly detection in smart city wireless sensor networks". Doctoral thesis, Universitat Oberta de Catalunya, 2017. http://hdl.handle.net/10803/565607.
Testo completoEsta tesis propone una plataforma de detección de intrusiones para revelar ataques en las redes de sensores inalámbricas (WSN, por las siglas en inglés) de las ciudades inteligentes (smart cities). La plataforma está diseñada teniendo en cuenta la necesidad de los administradores de la ciudad inteligente, los cuales necesitan acceso a una arquitectura centralizada que pueda gestionar alarmas de seguridad en un sistema altamente heterogéneo y distribuido. En esta tesis se identifican los varios pasos necesarios desde la recolección de datos hasta la ejecución de las técnicas de detección de intrusiones y se evalúa que el proceso sea escalable y capaz de gestionar datos típicos de ciudades inteligentes. Además, se comparan varios algoritmos de detección de anomalías y se observa que las máquinas de vectores de soporte de una misma clase (one-class support vector machines) resultan la técnica multivariante más adecuada para descubrir ataques teniendo en cuenta las necesidades de este contexto. Finalmente, se propone un esquema para ayudar a los administradores a identificar los tipos de ataques recibidos a partir de las alarmas disparadas.
This thesis proposes an intrusion detection platform which reveals attacks in smart city wireless sensor networks (WSN). The platform is designed taking into account the needs of smart city administrators, who need access to a centralized architecture that can manage security alarms in a highly heterogeneous and distributed system. In this thesis, we identify the various necessary steps from gathering WSN data to running the detection techniques and we evaluate whether the procedure is scalable and capable of handling typical smart city data. Moreover, we compare several anomaly detection algorithms and we observe that one-class support vector machines constitute the most suitable multivariate technique to reveal attacks, taking into account the requirements in this context. Finally, we propose a classification schema to assist administrators in identifying the types of attacks compromising their networks.
Labonne, Maxime. "Anomaly-based network intrusion detection using machine learning". Electronic Thesis or Diss., Institut polytechnique de Paris, 2020. http://www.theses.fr/2020IPPAS011.
Testo completoIn recent years, hacking has become an industry unto itself, increasing the number and diversity of cyber attacks. Threats on computer networks range from malware to denial of service attacks, phishing and social engineering. An effective cyber security plan can no longer rely solely on antiviruses and firewalls to counter these threats: it must include several layers of defence. Network-based Intrusion Detection Systems (IDSs) are a complementary means of enhancing security, with the ability to monitor packets from OSI layer 2 (Data link) to layer 7 (Application). Intrusion detection techniques are traditionally divided into two categories: signatured-based (or misuse) detection and anomaly detection. Most IDSs in use today rely on signature-based detection; however, they can only detect known attacks. IDSs using anomaly detection are able to detect unknown attacks, but are unfortunately less accurate, which generates a large number of false alarms. In this context, the creation of precise anomaly-based IDS is of great value in order to be able to identify attacks that are still unknown.In this thesis, machine learning models are studied to create IDSs that can be deployed in real computer networks. Firstly, a three-step optimization method is proposed to improve the quality of detection: 1/ data augmentation to rebalance the dataset, 2/ parameters optimization to improve the model performance and 3/ ensemble learning to combine the results of the best models. Flows detected as attacks can be analyzed to generate signatures to feed signature-based IDS databases. However, this method has the disadvantage of requiring labelled datasets, which are rarely available in real-life situations. Transfer learning is therefore studied in order to train machine learning models on large labeled datasets, then finetune them on benign traffic of the network to be monitored. This method also has flaws since the models learn from already known attacks, and therefore do not actually perform anomaly detection. Thus, a new solution based on unsupervised learning is proposed. It uses network protocol header analysis to model normal traffic behavior. Anomalies detected are then aggregated into attacks or ignored when isolated. Finally, the detection of network congestion is studied. The bandwidth utilization between different links is predicted in order to correct issues before they occur
Sseguya, Raymond. "Forecasting anomalies in time series data from online production environments". Thesis, Linköpings universitet, Institutionen för datavetenskap, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-166044.
Testo completoRibeiro, Manassés. "Deep learning methods for detecting anomalies in videos: theoretical and methodological contributions". Universidade Tecnológica Federal do Paraná, 2018. http://repositorio.utfpr.edu.br/jspui/handle/1/3172.
Testo completoA detecção de anomalias em vídeos de vigilância é um tema de pesquisa recorrente em visão computacional. Os métodos de aprendizagem profunda têm alcançado o estado da arte para o reconhecimento de padrões em imagens e o Autocodificador Convolucional (ACC) é uma das abordagens mais utilizadas por sua capacidade em capturar as estruturas 2D dos objetos. Neste trabalho, a detecção de anomalias se refere ao problema de encontrar padrões em vídeos que não pertencem a um conceito normal esperado. Com o objetivo de classificar anomalias adequadamente, foram verificadas formas de aprender representações relevantes para essa tarefa. Por esse motivo, estudos tanto da capacidade do modelo em aprender características automaticamente quanto do efeito da fusão de características extraídas manualmente foram realizados. Para problemas de detecção de anomalias do mundo real, a representação da classe normal é uma questão importante, sendo que um ou mais agrupamentos podem descrever diferentes aspectos de normalidade. Para fins de classificação, esses agrupamentos devem ser tão compactos (densos) quanto possível. Esta tese propõe o uso do ACC como uma abordagem orientada a dados aplicada ao contexto de detecção de anomalias em vídeos. Foram propostos métodos para o aprendizado de características espaço-temporais, bem como foi introduzida uma abordagem híbrida chamada Autocodificador Convolucional com Incorporação Compacta (ACC-IC), cujo objetivo é melhorar a compactação dos agrupamentos normais. Além disso, foi proposto um novo critério de parada baseado na sensibilidade e sua adequação para problemas de detecção de anomalias foi verificada. Todos os métodos propostos foram avaliados em conjuntos de dados disponíveis publicamente e comparados com abordagens estado da arte. Além do mais, foram introduzidos dois novos conjuntos de dados projetados para detecção de anomalias em vídeos de vigilância em rodovias. O ACC se mostrou promissor na detecção de anomalias em vídeos. Resultados sugerem que o ACC pode aprender características espaço-temporais automaticamente e a agregação de características extraídas manualmente parece ser valiosa para alguns conjuntos de dados. A compactação introduzida pelo ACC-IC melhorou o desempenho de classificação para a maioria dos casos e o critério de parada baseado na sensibilidade é uma nova abordagem que parece ser uma alternativa interessante. Os vídeos foram analisados qualitativamente de maneira visual, indicando que as características aprendidas com os dois métodos (ACC e ACC-IC) estão intimamente correlacionadas com os eventos anormais que ocorrem em seus quadros. De fato, ainda há muito a ser feito para uma definição mais geral e formal de normalidade, de modo que se possa ajudar pesquisadores a desenvolver métodos computacionais eficientes para a interpretação dos vídeos.
The anomaly detection in automated video surveillance is a recurrent topic in recent computer vision research. Deep Learning (DL) methods have achieved the state-of-the-art performance for pattern recognition in images and the Convolutional Autoencoder (CAE) is one of the most frequently used approach, which is capable of capturing the 2D structure of objects. In this work, anomaly detection refers to the problem of finding patterns in images and videos that do not belong to the expected normal concept. Aiming at classifying anomalies adequately, methods for learning relevant representations were verified. For this reason, both the capability of the model for learning automatically features and the effect of fusing hand-crafted features together with raw data were studied. Indeed, for real-world problems, the representation of the normal class is an important issue for detecting anomalies, in which one or more clusters can describe different aspects of normality. For classification purposes, these clusters must be as compact (dense) as possible. This thesis proposes the use of CAE as a data-driven approach in the context of anomaly detection problems. Methods for feature learning using as input both hand-crafted features and raw data were proposed, and how they affect the classification performance was investigated. This work also introduces a hybrid approach using DL and one-class support vector machine methods, named Convolutional Autoencoder with Compact Embedding (CAE-CE), for enhancing the compactness of normal clusters. Besides, a novel sensitivity-based stop criterion was proposed, and its suitability for anomaly detection problems was assessed. The proposed methods were evaluated using publicly available datasets and compared with the state-of-the-art approaches. Two novel benchmarks, designed for video anomaly detection in highways were introduced. CAE was shown to be promising as a data-driven approach for detecting anomalies in videos. Results suggest that the CAE can learn spatio-temporal features automatically, and the aggregation of hand-crafted features seems to be valuable for some datasets. Also, overall results suggest that the enhanced compactness introduced by the CAE-CE improved the classification performance for most cases, and the stop criterion based on the sensitivity is a novel approach that seems to be an interesting alternative. Videos were qualitatively analyzed at the visual level, indicating that features learned using both methods (CAE and CAE-CE) are closely correlated to the anomalous events occurring in the frames. In fact, there is much yet to be done towards a more general and formal definition of normality/abnormality, so as to support researchers to devise efficient computational methods to mimetize the semantic interpretation of visual scenes by humans.
Massaccesi, Luciano. "Machine Learning Software for Automated Satellite Telemetry Monitoring". Bachelor's thesis, Alma Mater Studiorum - Università di Bologna, 2020. http://amslaurea.unibo.it/20502/.
Testo completoFerreira, Vinícius Oliveira [UNESP]. "Classificação de anomalias e redução de falsos positivos em sistemas de detecção de intrusão baseados em rede utilizando métodos de agrupamento". Universidade Estadual Paulista (UNESP), 2016. http://hdl.handle.net/11449/138755.
Testo completoApproved for entry into archive by Ana Paula Grisoto (grisotoana@reitoria.unesp.br) on 2016-05-20T16:27:30Z (GMT) No. of bitstreams: 1 ferreira_vo_me_sjrp.pdf: 1594758 bytes, checksum: 0dbb0d2dd3fca3ed2b402b19b73006e7 (MD5)
Made available in DSpace on 2016-05-20T16:27:30Z (GMT). No. of bitstreams: 1 ferreira_vo_me_sjrp.pdf: 1594758 bytes, checksum: 0dbb0d2dd3fca3ed2b402b19b73006e7 (MD5) Previous issue date: 2016-04-27
Coordenação de Aperfeiçoamento de Pessoal de Nível Superior (CAPES)
Os Sistemas de Detecção de Intrusão baseados em rede (NIDS) são tradicionalmente divididos em dois tipos de acordo com os métodos de detecção que empregam, a saber: (i) detecção por abuso e (ii) detecção por anomalia. Aqueles que funcionam a partir da detecção de anomalias têm como principal vantagem a capacidade de detectar novos ataques, no entanto, é possível elencar algumas dificuldades com o uso desta metodologia. Na detecção por anomalia, a análise das anomalias detectadas pode se tornar dispendiosa, uma vez que estas geralmente não apresentam informações claras sobre os eventos maliciosos que representam; ainda, NIDSs que se utilizam desta metodologia sofrem com a detecção de altas taxas de falsos positivos. Neste contexto, este trabalho apresenta um modelo para a classificação automatizada das anomalias detectadas por um NIDS. O principal objetivo é a classificação das anomalias detectadas em classes conhecidas de ataques. Com essa classificação pretende-se, além da clara identificação das anomalias, a identificação dos falsos positivos detectados erroneamente pelos NIDSs. Portanto, ao abordar os principais problemas envolvendo a detecção por anomalias, espera-se equipar os analistas de segurança com melhores recursos para suas análises.
Network Intrusion Detection Systems (NIDS) are traditionally divided into two types according to the detection methods they employ, namely (i) misuse detection and (ii) anomaly detection. The main advantage in anomaly detection is its ability to detect new attacks. However, this methodology has some downsides. In anomaly detection, the analysis of the detected anomalies is expensive, since they often have no clear information about the malicious events they represent; also, it suffers with high amounts of false positives detected. In this context, this work presents a model for automated classification of anomalies detected by an anomaly based NIDS. Our main goal is the classification of the detected anomalies in well-known classes of attacks. By these means, we intend the clear identification of anomalies as well as the identification of false positives erroneously detected by NIDSs. Therefore, by addressing the key issues surrounding anomaly based detection, our main goal is to equip security analysts with best resources for their analyses.
Martignano, Anna. "Real-time Anomaly Detection on Financial Data". Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-281832.
Testo completoDetta arbete presenterar en undersökning av tillämpningar av Network Representation Learning (NRL) inom den finansiella industrin. Metoder inom NRL möjliggör datadriven kondensering av grafstrukturer till lågdimensionella och lätthanterliga vektorer.Dessa vektorer kan sedan användas i andra maskininlärningsuppgifter. Närmare bestämt, kan metoder inom NRL underlätta hantering av och informantionsutvinning ur beräkningsintensiva och storskaliga grafer inom den finansiella sektorn, till exempel avvikelsehantering bland finansiella transaktioner. Arbetet med data av denna typ försvåras av det faktum att transaktionsgrafer är dynamiska och i konstant förändring. Utöver detta kan noderna, dvs transaktionspunkterna, vara vitt skilda eller med andra ord härstamma från olika fördelningar.I detta arbete har Graph Convolutional Network (ConvGNN) ansetts till den mest lämpliga lösningen för nämnda tillämpningar riktade mot upptäckt av avvikelser i transaktioner. GraphSAGE har använts som utgångspunkt för experimenten i två olika varianter: en dynamisk version där vikterna uppdateras allteftersom nya transaktionssekvenser matas in, och en variant avsedd särskilt för bipartita (tvådelade) grafer. Dessa varianter har utvärderats genom användning av faktiska datamängder med avvikelsehantering som slutmål.
Malange, Fernando Cezar Vieira. "Rede Neuro-Fuzzy-Wavelet para detecção e classificação de anomalias de tensão em sistemas elétricos de potência /". Ilha Solteira : [s.n.], 2010. http://hdl.handle.net/11449/100308.
Testo completoBanca: Anna Diva Plasencia Lotufo
Banca: Mara Lúcia Martins Lopes
Banca: Arlan Luiz Bettiol
Banca: Edmárcio Antonio Belati
Resumo: Muitos esforços têm sido despendidos para tentar sanar problemas relacionados com Qualidade da Energia Elétrica (QEE), principalmente na automação de processos e desenvolvimento de equipamentos de monitorização que possibilitem maior desempenho e confiabilidade a todo o Sistema Elétrico. Esta pesquisa apresenta um sistema eficiente de identificador/classificador automático de distúrbios chamado de Rede Neuro-Fuzzy-Wavelet. A estrutura básica dessa rede é composta por três módulos: o módulo de detecção de anomalias onde os sinais com distúrbios são identificados, o módulo de extração de características onde as formas de onda com distúrbio são analisadas, e o módulo de classificação que conta com uma rede neural ARTMAP Fuzzy, a qual indica qual o tipo de distúrbio sofrido pelo sinal. Os tipos de distúrbios incluem os isolados de curto prazo, tais como: afundamento de tensão (sag), elevação de tensão (swell), os distúrbios de longo prazo como distorção harmônica, bem como distúrbios múltiplos simultâneos como afundamento de tensão com distorção harmônica e elevação de tensão com distorção harmônica. A concepção do sistema de inferência (neural wavelet ARTMAP fuzzy) permite realizar a classificação dos referidos distúrbios de forma robusta e com grande rapidez na obtenção das soluções. Testes apontam para o alto desempenho dessa rede na detecção e classificação correta dos tipos de distúrbios de tensão analisados, 100% de acerto. A forma robusta e grande rapidez na obtenção dos resultados, possibilita sua aplicação em tempo real, visto que o esforço computacional, muito pequeno, é alocado, basicamente, na fase de treinamento. Somente uma pequena parcela de tempo computacional é necessária para a efetivação das análises. Além do mais, a metodologia proposta pode ser estendida para a realização de tarefas mais complexas... (Resumo completo, clicar acesso eletrônico abaixo)
Abstract: Many efforts have been spent to solve problems related to Power Quality (PQ), principally in process automation and developing monitoring equipments that can provide more reliability and behavior for the electrical system. This research presents an efficient automatic system to identify/classify disturbs by Fuzzy Wavelet Neural Network. The basic structure of this neural network is composed of three modules such as: module for detecting anomalies where the signals with disturbs are identified, module for extracting the characteristics where the wave forms with disturbs are analyzed, and the module of classification that contains a fuzzy ARTMAP neural network that shows the type of disturbs existing in the signal. The types of disturbs include the short term isolated ones which are: voltage dip (sag), voltage increasing (swell); the long term disturbs such as harmonic distortion as well as the multiple simultaneous ones like the voltage dip with harmonic distortion and voltage increasing with harmonic distortion. The inference system (neural wavelet ARTMAP fuzzy) allows executing the classification of the cited disturbs very fast and obtaining reliable results. This neural network provides high performance when classifying and detecting the voltage disturbs very fast with about 100% of accuracy. The speed in obtaining the results allows an application in real time due to a low computational effort, which is basically in the training phase of the neural network. A little time of the computational effort is spent for the analysis. Moreover the proposed methodology can be used for realizing more complex tasks, as for example the localization of the power sources of the voltage disturbs. It is a very important contribution in the power quality, mainly to be a needy activity for solutions on the specialized literature
Doutor
Masana, Castrillo Marc. "Lifelong Learning of Neural Networks: Detecting Novelty and Adapting to New Domains without Forgetting". Doctoral thesis, Universitat Autònoma de Barcelona, 2020. http://hdl.handle.net/10803/671591.
Testo completoLa visión por computador ha experimentado cambios considerables en la última década a medida que las redes neuronales se han vuelto de uso común. Debido a que las capacidades computacionales disponibles han ido aumentando, las redes neuronales han logrado avances en muchas tareas de visión por computador e incluso han superado el rendimiento humano en otras. Una dirección de investigación que ha experimentado un aumento notable en interés son los sistemas de aprendizaje continuado. Estos sistemas deben ser capaces de realizar tareas de manera eficiente, identificar y aprender otras nuevas y, además, deben poder implementar versiones más compactas de sí mismos que sean expertos en tareas específicas. En esta tesis, contribuimos a la investigación sobre el aprendizaje continuado y abordamos la compresión y adaptación de redes a pequeños dominios, el aprendizaje incremental de redes ante una variedad de tareas y, finalmente, la detección de anomalías y novedades durante la inferencia. Exploramos cómo se puede transferir el conocimiento de grandes modelos pre-entrenados a redes con tareas más específicas capaces de ejecutarse en dispositivos más pequeños. El uso de un modelo pre-entrenado proporciona representaciones más robustas y una inicialización más estable al aprender una tarea más pequeña, lo que conduce a un mayor rendimiento y se conoce como adaptación de dominio. Sin embargo, esos modelos son demasiado grandes para ciertas aplicaciones que deben implementarse en dispositivos con memoria y capacidad computacional limitadas. En esta tesis mostramos que, después de realizar la adaptación de dominio, algunas activaciones aprendidas apenas contribuyen a las predicciones del modelo. Por lo tanto, proponemos aplicar compresión de redes basada en la descomposición matricial de bajo rango utilizando las estadísticas de las activaciones. Esto da como resultado una reducción significativa del tamaño del modelo y del coste computacional. Al igual que la inteligencia humana, el machine learning tiene como objetivo tener la capacidad de aprender y recordar conocimientos. Sin embargo, cuando una red neuronal ya entrenada aprende una nueva tarea, termina olvidando las anteriores. Esto se conoce como olvido catastrófico y su prevención se estudia en el aprendizaje continuo. El trabajo presentado en esta tesis analiza ampliamente las técnicas de aprendizaje continuo y presenta un enfoque para evitar el olvido catastrófico en escenarios de aprendizaje secuencial de tareas. Nuestra técnica se basa en utilizar máscaras ternarias cuando la red tiene que aprender nuevas tareas, reutilizando los conocimientos de las anteriores sin olvidar nada de ellas. A diferencia otros trabajos, nuestras máscaras se aplican a las activaciones de cada capa en lugar de a los pesos. Esto reduce considerablemente el número de parámetros que se agregarán para cada nueva tarea. Además, el análisis de una amplia gama de trabajos sobre aprendizaje incremental sin acceso a la identificación de la tarea, proporciona información sobre los enfoques actuales del estado del arte que se centran en evitar el olvido catastrófico mediante el uso de la regularización, el ensayo de tareas anteriores con memorias externas, o compensando el sesgo hacia la tarea más reciente. Las redes neuronales entrenadas con una función de coste basada en entropía cruzada obligan a las salidas del modelo a tender hacia un vector de salida única. Esto hace que los modelos tengan demasiada confianza cuando se les presentan imágenes o clases que no estaban presentes en la distribución del entrenamiento. La capacidad de un sistema para conocer los límites de las tareas aprendidas e identificar anomalías o clases que aún no se han aprendido es clave para el aprendizaje continuado y los sistemas autónomos. En esta tesis, presentamos un enfoque de aprendizaje con métricas para la detección de anomalías que aprende la tarea en un espacio métrico.
Computer vision has gone through considerable changes in the last decade as neural networks have come into common use. As available computational capabilities have grown, neural networks have achieved breakthroughs in many computer vision tasks, and have even surpassed human performance in others. With accuracy being so high, focus has shifted to other issues and challenges. One research direction that saw a notable increase in interest is on lifelong learning systems. Such systems should be capable of efficiently performing tasks, identifying and learning new ones, and should moreover be able to deploy smaller versions of themselves which are experts on specific tasks. In this thesis, we contribute to research on lifelong learning and address the compression and adaptation of networks to small target domains, the incremental learning of networks faced with a variety of tasks, and finally the detection of out-of-distribution samples at inference time. We explore how knowledge can be transferred from large pretrained models to more task-specific networks capable of running on smaller devices by extracting the most relevant information based on activation statistics. Using a pretrained model provides more robust representations and a more stable initialization when learning a smaller task, which leads to higher performance and is known as domain adaptation. However, those models are too large for certain applications that need to be deployed on devices with limited memory and computational capacity. In this thesis we show that, after performing domain adaptation, some learned activations barely contribute to the predictions of the model. Therefore, we propose to apply network compression based on low-rank matrix decomposition using the activation statistics. This results in a significant reduction of the model size and the computational cost. Like human intelligence, machine intelligence aims to have the ability to learn and remember knowledge. However, when a trained neural network is presented with learning a new task, it ends up forgetting previous ones. This is known as catastrophic forgetting and its avoidance is studied in continual learning. The work presented in this thesis extensively surveys continual learning techniques (both when knowing the task-ID at test time or not) and presents an approach to avoid catastrophic forgetting in sequential task learning scenarios. Our technique is based on using ternary masks in order to update a network to new tasks, reusing the knowledge of previous ones while not forgetting anything about them. In contrast to earlier work, our masks are applied to the activations of each layer instead of the weights. This considerably reduces the number of mask parameters to be added for each new task; with more than three orders of magnitude for most networks. Furthermore, the analysis on a wide range of work on incremental learning without access to the task-ID, provides insight on current state-of-the-art approaches that focus on avoiding catastrophic forgetting by using regularization, rehearsal of previous tasks from a small memory, or compensating the task-recency bias. We also consider the problem of out-of-distribution detection. Neural networks trained with a cross-entropy loss force the outputs of the model to tend toward a one-hot encoded vector. This leads to models being too overly confident when presented with images or classes that were not present in the training distribution. The capacity of a system to be aware of the boundaries of the learned tasks and identify anomalies or classes which have not been learned yet is key to lifelong learning and autonomous systems. In this thesis, we present a metric learning approach to out-of-distribution detection that learns the task at hand on an embedding space.
Malange, Fernando Cezar Vieira [UNESP]. "Rede Neuro-Fuzzy-Wavelet para detecção e classificação de anomalias de tensão em sistemas elétricos de potência". Universidade Estadual Paulista (UNESP), 2010. http://hdl.handle.net/11449/100308.
Testo completoConselho Nacional de Desenvolvimento Científico e Tecnológico (CNPq)
Muitos esforços têm sido despendidos para tentar sanar problemas relacionados com Qualidade da Energia Elétrica (QEE), principalmente na automação de processos e desenvolvimento de equipamentos de monitorização que possibilitem maior desempenho e confiabilidade a todo o Sistema Elétrico. Esta pesquisa apresenta um sistema eficiente de identificador/classificador automático de distúrbios chamado de Rede Neuro-Fuzzy-Wavelet. A estrutura básica dessa rede é composta por três módulos: o módulo de detecção de anomalias onde os sinais com distúrbios são identificados, o módulo de extração de características onde as formas de onda com distúrbio são analisadas, e o módulo de classificação que conta com uma rede neural ARTMAP Fuzzy, a qual indica qual o tipo de distúrbio sofrido pelo sinal. Os tipos de distúrbios incluem os isolados de curto prazo, tais como: afundamento de tensão (sag), elevação de tensão (swell), os distúrbios de longo prazo como distorção harmônica, bem como distúrbios múltiplos simultâneos como afundamento de tensão com distorção harmônica e elevação de tensão com distorção harmônica. A concepção do sistema de inferência (neural wavelet ARTMAP fuzzy) permite realizar a classificação dos referidos distúrbios de forma robusta e com grande rapidez na obtenção das soluções. Testes apontam para o alto desempenho dessa rede na detecção e classificação correta dos tipos de distúrbios de tensão analisados, 100% de acerto. A forma robusta e grande rapidez na obtenção dos resultados, possibilita sua aplicação em tempo real, visto que o esforço computacional, muito pequeno, é alocado, basicamente, na fase de treinamento. Somente uma pequena parcela de tempo computacional é necessária para a efetivação das análises. Além do mais, a metodologia proposta pode ser estendida para a realização de tarefas mais complexas...
Many efforts have been spent to solve problems related to Power Quality (PQ), principally in process automation and developing monitoring equipments that can provide more reliability and behavior for the electrical system. This research presents an efficient automatic system to identify/classify disturbs by Fuzzy Wavelet Neural Network. The basic structure of this neural network is composed of three modules such as: module for detecting anomalies where the signals with disturbs are identified, module for extracting the characteristics where the wave forms with disturbs are analyzed, and the module of classification that contains a fuzzy ARTMAP neural network that shows the type of disturbs existing in the signal. The types of disturbs include the short term isolated ones which are: voltage dip (sag), voltage increasing (swell); the long term disturbs such as harmonic distortion as well as the multiple simultaneous ones like the voltage dip with harmonic distortion and voltage increasing with harmonic distortion. The inference system (neural wavelet ARTMAP fuzzy) allows executing the classification of the cited disturbs very fast and obtaining reliable results. This neural network provides high performance when classifying and detecting the voltage disturbs very fast with about 100% of accuracy. The speed in obtaining the results allows an application in real time due to a low computational effort, which is basically in the training phase of the neural network. A little time of the computational effort is spent for the analysis. Moreover the proposed methodology can be used for realizing more complex tasks, as for example the localization of the power sources of the voltage disturbs. It is a very important contribution in the power quality, mainly to be a needy activity for solutions on the specialized literature
García, Ling Carlos. "Graphical Glitch Detection in Video Games Using CNNs". Thesis, KTH, Matematisk statistik, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-273574.
Testo completoDetta projekt svarar på följande forskningsfråga: Kan man använda Convolutional Neural Networks för att upptäcka felaktiga bilder i videospel? Vi fokuserar på de vanligast förekommande grafiska defekter i videospel, felaktiga textures (sträckt, lågupplöst, saknas och platshållare). Med hjälp av en systematisk process genererar vi data med både normala och felaktiga bilder. För att hitta defekter använder vi CNN via både Classification och Semantic Segmentation, med fokus på den första metoden. Den bäst presterande Classification-modellen baseras på ShuffleNetV2 och når 80.0%, 64.3%, 99.2% och 97.0% precision på respektive sträckt-, lågupplöst-, saknas- och platshållare-buggar. Detta medan endast 6.7% av negativa datapunkter felaktigt klassifieras som positiva. Denna undersökning ser även till hur modellen generaliserar till olika grafiska miljöer, vilka de primära orsakerna till förvirring hos modellen är, hur man kan bedöma säkerheten i nätverkets prediktion och hur man bättre kan förstå modellens interna struktur.
Le, bars Batiste. "Event detection and structure inference for graph vectors". Thesis, université Paris-Saclay, 2021. http://www.theses.fr/2021UPASM003.
Testo completoThis thesis addresses different problems around the analysis and the modeling of graph signals i.e. vector data that are observed over graphs. In particular, we are interested in two tasks. The rst one is the problem of event detection, i.e. anomaly or changepoint detection, in a set of graph vectors. The second task concerns the inference of the graph structure underlying the observed graph vectors contained in a data set. At first, our work takes an application oriented aspect in which we propose a method for detecting antenna failures or breakdowns in a telecommunication network. The proposed approach is designed to be eective for communication networks in a broad sense and it implicitly takes into account the underlying graph structure of the data. In a second time, a new method for graph structure inference within the framework of Graph Signal Processing is investigated. In this problem, notions of both local and globalsmoothness, with respect to the underlying graph, are imposed to the vectors.Finally, we propose to combine the graph learning task with the change-point detection problem. This time, a probabilistic framework is considered to model the vectors, assumed to be distributed from a specifc Markov Random Field. In the considered modeling, the graph underlying the data is allowed to evolve in time and a change-point is actually detected whenever this graph changes significantly
Khichane, Abderaouf. "Diagnostic of performance by data interpretation for 5G cloud native network functions". Electronic Thesis or Diss., université Paris-Saclay, 2024. http://www.theses.fr/2024UPASG017.
Testo completoOperators today are facing a profound and inevitable evolution of services and infrastructure. They are constantly pressured to accelerate the renewal of their offerings to meet new challenges and opportunities. It is in this context that the concept of "Cloud-native" network functions [1][2][3] is gaining increasing significance. Drawing inspiration from the IT world where "Cloud readiness" has already proven its worth, the idea of cloudifying network functions involves implementing scalable and self-healing functions while providing generic APIs accessible through their management and orchestration systems. However, the transition to a "Cloud-native" model is not limited to encapsulating network functions in virtual machines. It requires an adaptation, even a total redesign, of network functions.In this context, microservices architectures [4] become essential for the design of cloud-native 5G applications. Decomposing applications into independent services brings flexibility in terms of i) development, ii) deployment, and iii) scalability. Nevertheless, adopting this new architectural paradigm for virtualized network functions raises new questions about orchestration and automation operations. In particular, observability represents a cornerstone in monitoring 5G functions to provide the highest level of customer satisfaction. This functionality involves activities related to measuring, collecting, and analyzing telemetry data from both the operator's infrastructure and the applications running on it. Observability enables a deep understanding of network behavior and the anticipation of service quality degradation. Various observability approaches are proposed in the literature [5], allowing the analysis of the behavior of cloud-native IT applications and the implementation of necessary remediation actions.In this context, telemetry data provides precise information about the state of operator networks. However, the complexity of the operator's software-defined infrastructure and the volume of data [6] to be processed require the development of new techniques capable of detecting real-time risk situations and making the right decisions, for example, to avoid a violation of the Service Level Agreement (SLA). This is the framework in which the work of this thesis is situated
Cherdo, Yann. "Détection d'anomalie non supervisée sur les séries temporelle à faible coût énergétique utilisant les SNNs". Electronic Thesis or Diss., Université Côte d'Azur, 2024. http://www.theses.fr/2024COAZ4018.
Testo completoIn the context of the predictive maintenance of the car manufacturer Renault, this thesis aims at providing low-power solutions for unsupervised anomaly detection on time-series. With the recent evolution of cars, more and more data are produced and need to be processed by machine learning algorithms. This processing can be performed in the cloud or directly at the edge inside the car. In such a case, network bandwidth, cloud services costs, data privacy management and data loss can be saved. Embedding a machine learning model inside a car is challenging as it requires frugal models due to memory and processing constraints. To this aim, we study the usage of spiking neural networks (SNNs) for anomaly detection, prediction and classification on time-series. SNNs models' performance and energy costs are evaluated in an edge scenario using generic hardware models that consider all calculation and memory costs. To leverage as much as possible the sparsity of SNNs, we propose a model with trainable sparse connections that consumes half the energy compared to its non-sparse version. This model is evaluated on anomaly detection public benchmarks, a real use-case of anomaly detection from Renault Alpine cars, weather forecasts and the google speech command dataset. We also compare its performance with other existing SNN and non-spiking models. We conclude that, for some use-cases, spiking models can provide state-of-the-art performance while consuming 2 to 8 times less energy. Yet, further studies should be undertaken to evaluate these models once embedded in a car. Inspired by neuroscience, we argue that other bio-inspired properties such as attention, sparsity, hierarchy or neural assemblies dynamics could be exploited to even get better energy efficiency and performance with spiking models. Finally, we end this thesis with an essay dealing with cognitive neuroscience, philosophy and artificial intelligence. Diving into conceptual difficulties linked to consciousness and considering the deterministic mechanisms of memory, we argue that consciousness and the self could be constitutively independent from memory. The aim of this essay is to question the nature of humans by contrast with the ones of machines and AI
Hammami, Seif Eddine. "Dynamic network resources optimization based on machine learning and cellular data mining". Thesis, Evry, Institut national des télécommunications, 2018. http://www.theses.fr/2018TELE0015/document.
Testo completoReal datasets of mobile network traces contain valuable information about the network resources usage. These traces may be used to enhance and optimize the network performances. A real dataset of CDR (Call Detail Records) traces, that include spatio-temporal information about mobile users’ activities, are analyzed and exploited in this thesis. Given their large size and the fact that these are real-world datasets, information extracted from these datasets have intensively been used in our work to develop new algorithms that aim to revolutionize the infrastructure management mechanisms and optimize the usage of resource. We propose, in this thesis, a framework for network profiles classification, load prediction and dynamic network planning based on machine learning tools. We also propose a framework for network anomaly detection. These frameworks are validated using different network topologies such as wireless mesh networks (WMN) and drone-cell based networks. We show that using advanced data mining techniques, our frameworks are able to help network operators to manage and optimize dynamically their networks
Hammami, Seif Eddine. "Dynamic network resources optimization based on machine learning and cellular data mining". Electronic Thesis or Diss., Evry, Institut national des télécommunications, 2018. http://www.theses.fr/2018TELE0015.
Testo completoReal datasets of mobile network traces contain valuable information about the network resources usage. These traces may be used to enhance and optimize the network performances. A real dataset of CDR (Call Detail Records) traces, that include spatio-temporal information about mobile users’ activities, are analyzed and exploited in this thesis. Given their large size and the fact that these are real-world datasets, information extracted from these datasets have intensively been used in our work to develop new algorithms that aim to revolutionize the infrastructure management mechanisms and optimize the usage of resource. We propose, in this thesis, a framework for network profiles classification, load prediction and dynamic network planning based on machine learning tools. We also propose a framework for network anomaly detection. These frameworks are validated using different network topologies such as wireless mesh networks (WMN) and drone-cell based networks. We show that using advanced data mining techniques, our frameworks are able to help network operators to manage and optimize dynamically their networks
Merino, Laso Pedro. "Détection de dysfonctionements et d'actes malveillants basée sur des modèles de qualité de données multi-capteurs". Thesis, Ecole nationale supérieure Mines-Télécom Atlantique Bretagne Pays de la Loire, 2017. http://www.theses.fr/2017IMTA0056/document.
Testo completoNaval systems represent a strategic infrastructure for international commerce and military activity. Their protection is thus an issue of major importance. Naval systems are increasingly computerized in order to perform an optimal and secure navigation. To attain this objective, on board vessel sensor systems provide navigation information to be monitored and controlled from distant computers. Because of their importance and computerization, naval systems have become a target for hackers. Maritime vessels also work in a harsh and uncertain operational environments that produce failures. Navigation decision-making based on wrongly understood anomalies can be potentially catastrophic.Due to the particular characteristics of naval systems, the existing detection methodologies can't be applied. We propose quality evaluation and analysis as an alternative. The novelty of quality applications on cyber-physical systems shows the need for a general methodology, which is conceived and examined in this dissertation, to evaluate the quality of generated data streams. Identified quality elements allow introducing an original approach to detect malicious acts and failures. It consists of two processing stages: first an evaluation of quality; followed by the determination of agreement limits, compliant with normal states to identify and categorize anomalies. The study cases of 13 scenarios for a simulator training platform of fuel tanks and 11 scenarios for two aerial drones illustrate the interest and relevance of the obtained results
Lin, Sheng-Ya. "Modeling and Detection of Content and Packet Flow Anomalies at Enterprise Network Gateway". Thesis, 2013. http://hdl.handle.net/1969.1/149307.
Testo completoLin, Pinghai, e 林炳海. "Detection of Anomalous Spamming Activities in a Campus Network". Thesis, 2012. http://ndltd.ncl.edu.tw/handle/35907773431922583453.
Testo completo國立中正大學
資訊工程研究所
100
It is common to see the delivery of unsolicited emails in the Internet, namely spam. Most spam-filtering solutions are deployed on the receiver side. Although the solutions are good at filtering spam for end users, spam messages still keep wasting Internet bandwidth and the storage space of mail servers. This work is intended to detect spam hosts in a university campus to nip the spam sources in the bud. We use the Bro network intrusion detection system (NIDS) to collect the SMTP sessions, and track the volume and uniqueness of the target email addresses of outgoing sessions from each individual internal host as the features for detecting spamming hosts. The large number of email addresses can be efficiently stored in the Bloom filters. Over a period of six months from November 2011 to April 2012, we found totally 65 spammers in the campus and also observed 1.5 million outgoing spam messages. We also found 33% of internal mail servers that have an account cracking problem. The precision of the detection is 0.91, and the recall is 0.97.