Decoding Anomalies! Unraveling Operational Challenges in Human-in-the-Loop Anomaly Validation
Abstract
References
Index Terms
- Decoding Anomalies! Unraveling Operational Challenges in Human-in-the-Loop Anomaly Validation
Recommendations
Why is this an anomaly? Explaining anomalies using sequential explanations
Highlights- The area under the analyst certainty curve is a better measure compared to the minimum feature prefix.
AbstractIn most applications, anomaly detection operates in an unsupervised mode by looking for outliers hoping that they are anomalies. Unfortunately, most anomaly detectors do not come with explanations about which features make a detected ...
Automating root-cause analysis of network anomalies using frequent itemset mining
SIGCOMM '10Finding the root-cause of a network security anomaly is essential for network operators. In our recent work, we introduced a generic technique that uses frequent itemset mining to automatically extract and summarize the traffic flows causing an anomaly. ...
Automating root-cause analysis of network anomalies using frequent itemset mining
SIGCOMM '10: Proceedings of the ACM SIGCOMM 2010 conferenceFinding the root-cause of a network security anomaly is essential for network operators. In our recent work, we introduced a generic technique that uses frequent itemset mining to automatically extract and summarize the traffic flows causing an anomaly. ...
Comments
Please enable JavaScript to view thecomments powered by Disqus.Information & Contributors
Information
Published In
![cover image ACM Conferences](/cms/asset/3814030e-b990-479a-9bd8-926d9218d7cc/3663529.cover.jpg)
Sponsors
Publisher
Association for Computing Machinery
New York, NY, United States
Publication History
Check for updates
Author Tags
Qualifiers
- Research-article
Conference
Acceptance Rates
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 79Total Downloads
- Downloads (Last 12 months)79
- Downloads (Last 6 weeks)10
Other Metrics
Citations
View Options
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in