Detecting Weak Dependence in Computer Network Traffic Patterns by Using Higher Criticism
Detecting Weak Dependence in Computer Network Traffic Patterns by Using Higher Criticism
Summary To perform robust statistical anomaly detection in cybersecurity, we must build realistic models of the traffic patterns within a computer network. It is therefore important to understand the dependences between the large number of routinely interacting communication pathways within such a network. Pairs of interacting nodes in any directed …