A Haar Transform-Based Detection Approach to Network Traffic Anomalies in Power Telecommunication Access Networks

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Adaptive Telecommunication Network Traffic Control A Multi-Agent System Approach

This paper proposes an approach to the management of traffic in telecommunication networks. It was motivated by the growing need for Intelligent Network Management in current Telecommunication Networks such as PSTN, ISDN or transmission networks. The goal is to constantly act upon the network in order to control the traffic flow, trying to maximize the number of calls that reach destination or ...

متن کامل

Detecting Anomalies in Mobile Telecommunication Networks Using a Graph Based Approach

According to a survey conducted by the Communications Fraud Control Association an estimated $46.3 billion were lost due to telecommunications fraud in 2013. This suggests that the potential for intentional exploitation of unsuspecting users is an ongoing issue, and finding anomalies in telecommunications data can aide in the security of users, their phones, their personal information, and the ...

متن کامل

A Haar wavelets approach to Stirling's formula

This paper presents a proof of Stirling's formula using Haar wavelets and some properties of Hilbert space, such as Parseval's identity. The present paper shows a connection between Haar wavelets and certain sequences.

متن کامل

analysis of power in the network society

اندیشمندان و صاحب نظران علوم اجتماعی بر این باورند که مرحله تازه ای در تاریخ جوامع بشری اغاز شده است. ویژگیهای این جامعه نو را می توان پدیده هایی از جمله اقتصاد اطلاعاتی جهانی ، هندسه متغیر شبکه ای، فرهنگ مجاز واقعی ، توسعه حیرت انگیز فناوری های دیجیتال، خدمات پیوسته و نیز فشردگی زمان و مکان برشمرد. از سوی دیگر قدرت به عنوان موضوع اصلی علم سیاست جایگاه مهمی در روابط انسانی دارد، قدرت و بازتولید...

15 صفحه اول

Anomalies Classification Approach for Network-based Intrusion Detection System

Anomaly based intrusion detection system (A-IDS) is considered to be a better option than signature based system since it does not require prior knowledge of attack signature before it can be used to detect an intrusion. However managing alarms generated by this system is more difficult than signature-based intrusion detection systems (SIDSs). This is due to the fact that S-IDS generates rich i...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: DEStech Transactions on Computer Science and Engineering

سال: 2018

ISSN: 2475-8841

DOI: 10.12783/dtcse/iceiti2017/18864