Essays about: "Anomalidetektering"

Showing result 21 - 25 of 29 essays containing the word Anomalidetektering.

  1. 21. Efficient learning on high-dimensional operational data

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Hongyi Zhang; [2019]
    Keywords : Data-driven engineering; Machine learning; Dimensionality reduction; Data-driven teknik; Maskininlärning; Dimensionalitet minskning;

    Abstract : In a networked system, operational data collected by sensors or extracted from system logs can be used for target performance prediction, anomaly detection, etc. However, the number of metrics collected from a networked system is very large and usually can reach about 106 for a medium-sized system. READ MORE

  2. 22. Clustering Based Outlier Detection for Improved Situation Awareness within Air Traffic Control

    University essay from KTH/Optimeringslära och systemteori

    Author : Hanna Gustavsson; [2019]
    Keywords : Applied Mathematics; Clustering; Spectral Clustering; Graph Theory; GMM; Outlier Detection; Tillämpad matematik; Klustering; Spektralklustering; grafteori; GMM; anomalidetektering;

    Abstract : The aim of this thesis is to examine clustering based outlier detection algorithms on their ability to detect abnormal events in flight traffic. A nominal model is trained on a data-set containing only flights which are labeled as normal. READ MORE

  3. 23. Unsupervised anomaly detection on log-based time series data

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Oskar Granlund; [2019]
    Keywords : ;

    Abstract : Due to a constant increase in the number of connected devices and there is an increased demand for confidentiality, availability, and integrity on applications. This thesis was focused on unsupervised anomaly detection in data centers. READ MORE

  4. 24. Information-Theoretic Framework for Network Anomaly Detection: Enabling online application of statistical learning models to high-speed traffic

    University essay from KTH/Matematisk statistik

    Author : Gabriel Damour; [2019]
    Keywords : Network Security; Distributed Denial of Service; DDoS; DoS; Anomaly Detection; Intrusion Detection; Attack Source Identification; Information Theory; Statistical Learnin; Nätverkssäkerhet; Distribuerad Överbelastningsattack; DDoS; DoS; Anomalidetektering; Intrångsdetektering; Identifiering av Attackkällor; Informationsteori; Maskininlärning;

    Abstract : With the current proliferation of cyber attacks, safeguarding internet facing assets from network intrusions, is becoming a vital task in our increasingly digitalised economies. Although recent successes of machine learning (ML) models bode the dawn of a new generation of intrusion detection systems (IDS); current solutions struggle to implement these in an efficient manner, leaving many IDSs to rely on rule-based techniques. READ MORE

  5. 25. Detecting Performance Anomalies in a Mobile Application with Unsupervised Machine Learning

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Lukas Saari; [2019]
    Keywords : ;

    Abstract : Unsupervised anomaly detection algorithms are applied with the purpose of identifying performance regressions in a mobile application. To evaluate the performance, a labeled artificial data set is generated that is based on a real data set and that aims to reflect its properties. READ MORE