- document
-
Dimitrovski, T. (author), Bergman, T. (author), Zuraniewski, P. (author)The use of Machine Learning in many control and management processes is rising fast. This is especially true for the management of cloud native applications and for anomaly detection in cyber-security mechanisms. However, it has been shown that ML is an attack surface on its own, especially when the attack is performed by another ML system....conference paper 2023
- document
-
Oosterman, D.T. (author), Langenkamp, W.H. (author), van Bergen, E.L. (author)In this paper we describe our initial findings on a method for improving anomaly detection on a dataset with scarcely labeled data, based on an ongoing use-case with the Belgian Customs Administration (BCA). Data on shipping containers is used to predict the level of risk associated with a shipment, as well as the probability that the shipment...conference paper 2022
- document
-
de Gijsel, S.L. (author), Vijn, A.R.P.J. (author), Tan, R.G. (author)This paper proposes an algorithm to localize a magnetic dipole using a limited number of noisy measurements from magnetic field sensors. The algorithm is based on the theory of compressed sensing, and exploits the sparseness of the magnetic dipole in space. Beforehand, a basis consisting of magnetic dipole fields belonging to individual dipoles...article 2022
- document
-
Bortolameotti, R. (author), van Ede, T. (author), Caselli, M. (author), Everts, M.H. (author), Hartel, P. (author), Hofstede, R. (author), Jonker, W. (author), Peter, A. (author)We present DECANTeR, a system to detect anomalous outbound HTTP communication, which passively extracts fingerprints for each application running on a monitored host. The goal of our system is to detect unknown malware and backdoor communication indicated by unknown fingerprints extracted from a host's network traffic. We evaluate a prototype...conference paper 2017
- document
-
Bosman, H.H.W.J. (author), Iacca, G. (author), Tejada, A. (author), Wörtche, H.J. (author), Liotta, A. (author)The field of wireless sensor networks (WSNs), embedded systems with sensing and networking capabil- ity, has now matured after a decade-long research effort and technological advances in electronics and networked systems. An important remaining challenge now is to extract meaningful information from the ever-increasing amount of sensor data...article 2016
- document
-
Santini, F. (author), Palombo, A. (author), Dekker, R.J. (author), Pignatti, S. (author), Pascucci, S. (author), Schwering, P.B.W. (author)Anomalous pixel responses often seriously affect remote sensing applications, especially in the thermal spectral range. In this paper, a new method to identify and correct anomalous pixel responses is presented. The method was specifically developed to handle with hyperspectral data and is based on the statistical analysis of a gray scale RX...article 2014
- document
-
de Vries, H.W.W. (author), Azzopardi, G. (author), Koelewijn, A. (author), Knobbe, A. (author)Dike monitoring is crucial for protection against flooding disasters, an especially important topic in low countries, such as the Netherlands where many regions are below sea level. Recently, there has been growing interest in extending traditional dike monitoring by means of a sensor network. This paper presents a case study of a set of pore...bookPart 2014
- document
-
Trichias, K. (author), Pijpers, R.J.M. (author), Meeuwissen, H.B. (author)Structural Health Monitoring (SHM) systems help to monitor critical infrastructures (bridges, tunnels, etc.) remotely and provide up-to-date information about their physical condition. In addition, it helps to predict the structure’s life and required maintenance in a cost-efficient way. Typically, inspection data gives insight in the structural...conference paper 2014
- document
-
Mata, F. (author), Zuraniewski, P.W. (author), Mandjes, M. (author), Mellia, M. (author)In this paper we present methodological advances in anomaly detection tailored to discover abnormal traffic patterns under the presence of seasonal trends in data. In our setup we impose specific assumptions on the traffic type and nature; our study features VoIP call counts, for which several traces of real data has been used in this study, but...article 2014
- document
-
Pyayt, A.L. (author), Kozionov, A.P. (author), Mokhov, I.I. (author), Lang, B. (author), Meijer, R.J. (author), Krzhizhanovskaya, V.V. (author), Sloot, P.M.A. (author)Detection of early warning signals for the imminent failure of large and complex engineered structures is a daunting challenge with many open research questions. In this paper we report on novel ways to perform Structural Health Monitoring (SHM) of flood protection systems (levees, earthen dikes and concrete dams) using sensor data. We present a...article 2014
- document
-
Ellens, W. (author), Zuraniewski, P.W. (author), Sperotto, A. (author), Schotanus, H.A. (author), Mandjes, M. (author), Meeuwissen, H.B. (author)DNS tunnels allow circumventing access and security policies in firewalled networks. Such a security breach can be misused for activities like free web browsing, but also for command & control traffic or cyber espionage, thus motivating the search for effective automated DNS tunnel detection techniques. In this paper we develop such a technique,...bookPart 2013
- document
-
Callegari, C. (author), Coluccia, A. (author), D'alconzo, A. (author), Ellens, W. (author), Giordano, S. (author), Mandjes, M. (author), Pagano, M. (author), Pepe, T. (author), Ricciato, F. (author), Zuraniewski, P.W. (author)In this Chapter we give an overview of statistical methods for anomaly detection (AD), thereby targeting an audience of practitioners with general knowledge of statistics. We focus on the applicability of the methods by stating and comparing the conditions in which they can be applied and by discussing the parameters that need to be set. © 2013...bookPart 2013
- document
-
Vonder, M.R. (author), van der Waaij, B.D. (author)The Dutch lowlands are protected by many kilometres of dikes. Currently these dikes are visually inspected on a regular basis. During heavy weather this frequency is raised, up to 24/7 in very extreme situations. After a dike failure at the Dutch town Wilnis in 2003, the question was raised whether modern sensor technology could be used to...conference paper 2013
- document
-
van Leeuwen, C. (author), Halma, A. (author), Schutte, K. (author)Detection of anomalies (outliers or abnormal instances) is an important element in a range of applications such as fault, fraud, suspicious behavior detection and knowledge discovery. In this article we propose a new method for anomaly detection and performed tested its ability to detect anomalous behavior in videos from DARPA's Mind's Eye...conference paper 2013
- document
-
On the early detection of threats in the real world based on open-source information on the internetBouma, H. (author), Rajadell Rojas, O. (author), Worm, D.T.H. (author), Versloot, C.A. (author), Wedemeijer, H. (author)Many threats in the real world can be related to activities of persons on the internet. Internet surveillance aims to detect threats in an early stage and to assist in finding suspects based on information from the web. However, the amount of data on the internet rapidly increases and it is time consuming to monitor many open sources. In this...conference paper 2012
- document
-
Bouma, H. (author), Raaijmakers, S.A. (author), Halma, A.H.R. (author), Wedemeijer, H. (author)Many threats in the real world can be related to activity of persons on the internet. Internet surveillance aims to predict and prevent attacks and to assist in finding suspects based on information from the web. However, the amount of data on the internet rapidly increases and it is time consuming to monitor many websites. In this paper, we...conference paper 2012
- document
-
Pyayt, A.L. (author), Mokhov, I.I. (author), Kozionov, A. (author), Kusherbaeva, V. (author), Melnikova, N.B. (author), Krzhizhanovskaya, V.V. (author), Meijer, R.J. (author)We present a hybrid approach to monitoring the stability of flood defence structures equipped with sensors. This approach combines the finite element modelling with the artificial intelligence for real-time signal processing and anomaly detection. This combined method has been developed for the UrbanFlood early warning system and successfully...conference paper 2011
- document
-
Vonder, M.R. (author), van der Waaij, B.D. (author), Zwier, E. (author), Boertjes, E.M. (author), Oostveen, J.C. (author), Raaijmakers, S.A. (author), Schavemaker, J.G.M. (author), Schutte, K. (author), Meulenhoff, P.J. (author), van der Mark, W. (author)Door de voortschrijdende technologische ontwikkelingen van sensor technologie en de groeiende complexiteit van onze samenleving, is er een duidelijke behoefte ontstaan om (meer) inzicht te krijgen in bestaande situaties en/of objecten. Om te voorkomen dat er een overload aan sensor data ontstaat is automatische ondersteuning van de interpretatie...report 2011
- document
-
TNO Defensie en Veiligheid (author), Briottet, X. (author), Boucher, Y. (author), Dimmeler, A. (author), Malaplate, A. (author), Cini, A. (author), Diani, M. (author), Bekman, H.H.P.T. (author), Schwering, P.B.W. (author), Skauli, T. (author), Kasen, I. (author), Renhorn, I. (author), Klasén, L. (author), Gilmore, M. (author), Oxford, D. (author)Optical imaging, including infrared imaging, generally has many important applications, both civilian and military. In recent years, technological advances have made multi- and hyperspectral imaging a viable technology in many demanding military application areas. The aim of the CEPA JP 8.10 program has been to evaluate the potential benefit of...conference paper 2006
- document
-
de Jong, W. (author), Schavemaker, J.G.M. (author), Breuers, M.G.J. (author), Baan, J. (author), Schleijpen, H.M.A. (author)This paper describes the development and implementation of a low cost camera system that uses polarisation features of visible light for faster area reduction. The camera system will be mounted on a mechanical minefield area reduction asset, namely an AT mine roller of The HALO Trust. The automatic detection system will give an audible alarm in...conference paper 2004