As the complexity of Internet is scaled up, it is likely for the Internet resources to be exposed to Distributed Denial of Service (DDoS) flooding attacks on TCP-based Web servers. there has been a lot of related work...
详细信息
ISBN:
(纸本)354040550X
As the complexity of Internet is scaled up, it is likely for the Internet resources to be exposed to Distributed Denial of Service (DDoS) flooding attacks on TCP-based Web servers. there has been a lot of related work which focuses on analyzing the pattern of the DDoS attacks to protect users from them. However, none of these studies takes all the flags within TCP header into account, nor do they analyze relationship between the flags and the TCP packets. To analyze the features of the DDoS attacks, therefore, this paper presents a network traffic analysis mechanism which computes the ratio of the number of TCP flags to the total number of TCP packets. Based upon the calculation of TCP flag rates, we compile a pair of the TCP flag rates and the presence (or absence) of the DDoS attack into state-action rules using machinelearning algorithms. We endow alarming agents with a tapestry of the compiled rules. the agents can then detect network flooding attacks against a Web server. We validate our framework with experimental results in a simulated TCP-based network setting. the experimental results show a distinctive and predictive pattern of the DDoS attacks, and our alarming agents can successfully detect various DDoS attacks.
Although multilayer perceptrons (MLPs) present several advantages against other patternrecognition methods, MLP-based speaker verification systems suffer from slow enrollment speed caused by many background speakers ...
详细信息
Given a biometric feature-space, in this paper we present a method to predict cumulative match characteristic (CMC) curve performance for a large population of individuals using a significantly smaller population to m...
详细信息
Breast self-examination (BSE) is a non-invasive, self-administered and simple screening procedure for detecting breast cancer at an early stage. this procedure can be performed in private and at any time. A variety of...
详细信息
Breast self-examination (BSE) is a non-invasive, self-administered and simple screening procedure for detecting breast cancer at an early stage. this procedure can be performed in private and at any time. A variety of leaflets and websites exist, which attempt to train women on how to perform BSE. there are also some learning systems consisting of videos and audio cassettes. However, there are no fully interactive systems in existence and no real-time feedback is given to a user on whether she is correctly performing the procedure. We aim to develop an intelligent interactive multimedia system incorporating patternrecognition and machine vision techniques, and provide real-time feedback to assist and guide women to perform BSE accurately. Using her hand in a specific configuration to conduct palpation of the breasts is the basic means available for a woman to perform BSE. However, a human hand is highly articulated and deformable with 27 degree-of-freedom parameters according to its anatomy. Recognising hand gestures and postures is a challenging task that has been studied in many areas and applications. In this paper, the simplified three-dimensional (3D) hand model is presented, which has only 8 degree-of-freedom parameters and is especially adapted for use withthe breast self-examination system. this model will be a potentially effective simulation and tracking tool that will contribute to BSE learning and thus to the development of an intelligent fully interactive BSE system.
Recent times have seen an explosive growth in the availability of various kinds of data. It has resulted in an unprecedented opportunity to develop automated data-driven techniques of extracting useful knowledge. data...
详细信息
In the year 2000 a competition was organised to collect face verification results on an identical, publicly available data set using a standard evaluation protocol. the database used was the Xm2vts database along with...
详细信息
Statistical learning problems in many fields involve sequential data. this paper formalizes the principal learning tasks and describes the methods that have been developed within the machinelearning research communit...
详细信息
this paper presents an application of machinelearning to the problem of classifying patients with glaucoma into one of two classes:stable and progressive glaucoma. the novelty of the work is the use of new features f...
详细信息
Character recognition systems can contribute tremendously to the advancement of the automation process and can improve the interaction between man and machine in many applications, including office automation, cheque ...
详细信息
the proceedings contain 90 papers. the special focus in this conference is on Graphs, Languages, Strings and Grammars. the topics include: Spectral methods for view-based 3-D object recognition using silhouettes;machi...
ISBN:
(纸本)3540440119
the proceedings contain 90 papers. the special focus in this conference is on Graphs, Languages, Strings and Grammars. the topics include: Spectral methods for view-based 3-D object recognition using silhouettes;machinelearning for sequential data;graph-based methods for vision;reducing the computational cost of computing approximated median strings;tree k-grammar models for natural language modelling and parsing;algorithms for learning function distinguishable regular languages;non-bayesian graph matching without explicit compatibility calculations;spectral feature vectors for graph clustering;identification of diatoms by grid graph matching;string edit distance, random walks and graph matching;learning structural variations in shock trees;a comparison of algorithms for maximum common subgraph on randomly connected graphs;inexact multisub graph matching using graph eigenspace and clustering models;optimal lower bound for generalized median problems in metric space;structural description to recognising arabic characters using decision tree learning techniques;feature approach for printed document image analysis;example-driven graphics recognition;estimation of texels for regular mosaics using model-based interaction maps;using graph search techniques for contextual colour retrieval;comparing shape and temporal PDMs;linear shape recognition with mixtures of point distribution models;curvature weighted evidence combination for shape-from-shading;probabilistic decisions in production nets;an application of machinelearning techniques for the classification of glaucomatous progression;estimating the joint probability distribution of random vertices and arcs by means of second-order random graphs.
暂无评论