...
| Data Sets with Events | Data Sets with no Events | ||
---|---|---|---|---|
<ac:structured-macro ac:name="unmigrated-wiki-markup" ac:schema-version="1" ac:macro-id="524b9c2b-2f6c-46ef-beef-cb83c1c24f2d"><ac:plain-text-body><![CDATA[ | IEPM | [[rar^datasets-with-events.rar] ] 3.4 MB, [[zip^datasets-with-events.zip] ] 3.6 MB | [[rar^datasets-with-no-events.rar]] 3.3 MB, [[zip^datasets-with-no-events.zip]] 3.5 MB | ]]></ac:plain-text-body></ac:structured-macro> |
All files with name "filename_raw_dataset.pathchirp" contain the raw data i.e the available bandwidth measurements along with the timestamps which are used in all algorithms.
All files with name "filename_event_file.txt" contain the list of events identified.
...
The technical report titled "A performance evaluation of anomaly detection algorithms for Internet Paths" is will be available heresoon.
The range of input parameters used for the comparative analysis are summarized below. Note that each algorithm requires a different set of parameters.
Input/Tuning parameters
Plateau Algorithm (PL)
...
Holt Winter's Method (HW)
? - alpha | ? - beta | ? - gamma | ? - sigma |
---|---|---|---|
0.1 | 0.1 - 0.3 | 0.1 - 0.5 | 2.0 |
Adaptive Fault Detector (AFD)
Window Size (N) | ? - alpha | ? - beta | No. of Training Data (Hn) |
---|---|---|---|
20 | 0.95 | 0.0015 - 0.1 | 100 |
...
History Buffer Length (N) | ? - alpha | ? - beta | Median filter length ( n) |
---|---|---|---|
30 - 90 | 0.01 - 0.34 | 0.99 | 100 |
...