- 1、原创力文档(book118)网站文档一经付费(服务费),不意味着购买了该文档的版权,仅供个人/单位学习、研究之用,不得用于商业用途,未经授权,严禁复制、发行、汇编、翻译或者网络传播等,侵权必究。。
 - 2、本站所有内容均由合作方或网友上传,本站不对文档的完整性、权威性及其观点立场正确性做任何保证或承诺!文档内容仅供研究参考,付费前请自行鉴别。如您付费,意味着您自己接受本站规则且自行承担风险,本站不退款、不进行额外附加服务;查看《如何避免下载的几个坑》。如果您已付费下载过本站文档,您可以点击 这里二次下载。
 - 3、如文档侵犯商业秘密、侵犯著作权、侵犯人身权等,请点击“版权申诉”(推荐),也可以打举报电话:400-050-0827(电话支持时间:9:00-18:30)。
 - 4、该文档为VIP文档,如果想要下载,成为VIP会员后,下载免费。
 - 5、成为VIP后,下载本文档将扣除1次下载权益。下载后,不支持退款、换文档。如有疑问请联系我们。
 - 6、成为VIP后,您将拥有八大权益,权益包括:VIP文档下载权益、阅读免打扰、文档格式转换、高级专利检索、专属身份标志、高级客服、多端互通、版权登记。
 - 7、VIP文档为合作方或网友上传,每下载1次, 网站将根据用户上传文档的质量评分、类型等,对文档贡献者给予高额补贴、流量扶持。如果你也想贡献VIP文档。上传文档
 
                        查看更多
                        
                    
                序贯分析tutorial概要1
                    Sequential analysis:balancing the tradeoff between detection accuracy and detection delay XuanLong Nguyen xuanlong@eecs.berkeley.edu Radlab, 11/06/06 Outline Motivation in detection problems need to minimize detection delay time  Brief intro to sequential analysis sequential hypothesis testing sequential change-point detection Applications Detection of anomalies in network traffic (network attacks), faulty software, etc Three quantities of interest in detection problems  Detection accuracy False alarm rate Misdetection rate  Detection delay time Network volume anomaly detection So far, anomalies treated as isolated events Spikes seem to appear out of nowhere  Hard to predict early short burst unless we reduce the time granularity of collected data   To achieve early detection have to look at medium to long-term trend know when to stop deliberating Early detection of anomalous trends We want to distinguish “bad” process from good process/ multiple processes detect a point where a “good” process turns bad  Applicable when evidence accumulates over time (no matter how fast or slow) e.g., because a router or a server fails worm propagates its effect  Sequential analysis is well-suited  minimize the detection time given fixed false alarm and misdetection rates balance the tradeoff between these three quantities (false alarm, misdetection rate, detection time) effectively  Example: Port scan detection Detect whether a remote host is a port scanner or a benign host  Ground truth: based on percentage of local hosts which a remote host has a failed connection  We set:  for a scanner, the probability of hitting inactive local host is 0.8 for a benign host, that probability is 0.1  Figure:  X: percentage of inactive local hosts for a remote host Y: cumulative distribution function for X Hypothesis testing formulation A remote host R attempts to connect a local host at time i let Yi = 0 if the connection attempt is a success,  		     1 if failed connection  As outcomes Y1, Y2
                您可能关注的文档
- 广州恒大英语口语演讲PPT概要1.ppt
 - 广州版五年级上册 U2His hobby is drawing概要1.pptx
 - 广州版小学三年级英语上册单元同步练习题全套概要1.doc
 - 广州版小学四年级英语下册U10课件概要1.ppt
 - 广州深圳牛津英语八年级下Unit 6 Period 6概要1.ppt
 - 广州版小学英语四年级下册Unit_8_Sport_Stars概要1.ppt
 - 广州版新教材三年级下学期英语教案概要1.doc
 - 广州深圳牛津英语八年级下Unit 6 Period 2概要1.ppt
 - 广州版小学英语三年级上册U6touch your head概要1.ppt
 - 广州版新版小学英语三年级上册_M2_复习课件概要1.ppt
 
原创力文档
                        

文档评论(0)