User profiles for Tanja Zseby
Tanja ZsebyTU Wien Verified email at tuwien.ac.at Cited by 3629 |
Analysis of network traffic features for anomaly detection
F Iglesias, T Zseby - Machine Learning, 2015 - Springer
Anomaly detection in communication networks provides the basis for the uncovering of
novel attacks, misconfigurations and network failures. Resource constraints for data storage, …
novel attacks, misconfigurations and network failures. Resource constraints for data storage, …
[HTML][HTML] Requirements for IP flow information export (IPFIX)
… Zseby … Tanja Zseby … EMail: zseby@fokus.fhg.de …
[HTML][HTML] Anomaly detection in streaming data: A comparison and evaluation study
The detection of anomalies in streaming data faces complexities that make traditional static
methods unsuitable due to computational costs and nonstationarity. We test and evaluate …
methods unsuitable due to computational costs and nonstationarity. We test and evaluate …
Cyber attack models for smart grid environments
Smart grids utilize communication technologies that make them vulnerable to cyber attacks.
Because the power grid is a critical infrastructure, it is a tempting target for sophisticated and …
Because the power grid is a critical infrastructure, it is a tempting target for sophisticated and …
[HTML][HTML] Sampling and filtering techniques for IP packet selection
T Zseby, M Molina, N Duffield, S Niccolini, F Raspall - 2009 - rfc-editor.org
… Zseby … Zseby, "Stratification Strategies for Sampling-based … Tanja Zseby …
Explainability and adversarial robustness for rnns
Recurrent Neural Networks (RNNs) yield attractive properties for constructing Intrusion
Detection Systems (IDSs) for network data. With the rise of ubiquitous Machine Learning (ML) …
Detection Systems (IDSs) for network data. With the rise of ubiquitous Machine Learning (ML) …
A flow-based IDS using Machine Learning in eBPF
eBPF is a new technology which allows dynamically loading pieces of code into the Linux
kernel. It can greatly speed up networking since it enables the kernel to process certain …
kernel. It can greatly speed up networking since it enables the kernel to process certain …
Botnet communication patterns
Malicious botnets have become a common threat and pervade large parts of the Internet
today. Existing surveys and taxonomies focus on botnet topologies, command and control …
today. Existing surveys and taxonomies focus on botnet topologies, command and control …
[HTML][HTML] Analysis of lightweight feature vectors for attack detection in network traffic
F Meghdouri, T Zseby, F Iglesias - Applied Sciences, 2018 - mdpi.com
Featured Application Optimal design of feature vectors for early-phase attack detection in
large communication networks. Abstract The consolidation of encryption and big data in …
large communication networks. Abstract The consolidation of encryption and big data in …
When YouTube does not work—Analysis of QoE-relevant degradation in Google CDN traffic
YouTube is the most popular service in today's Internet. Google relies on its massive content
delivery network (CDN) to push YouTube videos as close as possible to the end-users, both …
delivery network (CDN) to push YouTube videos as close as possible to the end-users, both …