A Haar Transform-Based Detection Approach to Network Traffic Anomalies in Power Telecommunication Access Networks
نویسندگان
چکیده
منابع مشابه
Adaptive Telecommunication Network Traffic Control A Multi-Agent System Approach
This paper proposes an approach to the management of traffic in telecommunication networks. It was motivated by the growing need for Intelligent Network Management in current Telecommunication Networks such as PSTN, ISDN or transmission networks. The goal is to constantly act upon the network in order to control the traffic flow, trying to maximize the number of calls that reach destination or ...
متن کاملDetecting Anomalies in Mobile Telecommunication Networks Using a Graph Based Approach
According to a survey conducted by the Communications Fraud Control Association an estimated $46.3 billion were lost due to telecommunications fraud in 2013. This suggests that the potential for intentional exploitation of unsuspecting users is an ongoing issue, and finding anomalies in telecommunications data can aide in the security of users, their phones, their personal information, and the ...
متن کاملA Haar wavelets approach to Stirling's formula
This paper presents a proof of Stirling's formula using Haar wavelets and some properties of Hilbert space, such as Parseval's identity. The present paper shows a connection between Haar wavelets and certain sequences.
متن کاملanalysis of power in the network society
اندیشمندان و صاحب نظران علوم اجتماعی بر این باورند که مرحله تازه ای در تاریخ جوامع بشری اغاز شده است. ویژگیهای این جامعه نو را می توان پدیده هایی از جمله اقتصاد اطلاعاتی جهانی ، هندسه متغیر شبکه ای، فرهنگ مجاز واقعی ، توسعه حیرت انگیز فناوری های دیجیتال، خدمات پیوسته و نیز فشردگی زمان و مکان برشمرد. از سوی دیگر قدرت به عنوان موضوع اصلی علم سیاست جایگاه مهمی در روابط انسانی دارد، قدرت و بازتولید...
15 صفحه اولAnomalies Classification Approach for Network-based Intrusion Detection System
Anomaly based intrusion detection system (A-IDS) is considered to be a better option than signature based system since it does not require prior knowledge of attack signature before it can be used to detect an intrusion. However managing alarms generated by this system is more difficult than signature-based intrusion detection systems (SIDSs). This is due to the fact that S-IDS generates rich i...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: DEStech Transactions on Computer Science and Engineering
سال: 2018
ISSN: 2475-8841
DOI: 10.12783/dtcse/iceiti2017/18864