منابع مشابه
SYNERGY: Detecting and Diagnosing Correlated Network Anomalies
Network anomalies occur in operational networks and may be logged by a number of network measurement tools such as SNMP and NetFlow. However, accurate and efficient detection of these anomalies in the logged data is very challenging due to the huge data volume and complex characteristics of anomalies. The existing approaches are limited by the nature of underlying mathematical models and might ...
متن کاملRisk Leveling of Network Traffic Anomalies
The goal of intrusion detection is to identify attempted or ongoing attacks on a computer system or network. Many attacks aim to compromise computer networks in an online manner. Traffic anomalies have been an important indication of such attacks. Challenges in the detections lie in modeling of the large continuous streams of data and performing anomaly detection in an online manner. This paper...
متن کاملAutomated Classification of Network Traffic Anomalies
Network traffic anomalies detection and characterization has been a hot topic of research for many years. Although the field is very advanced in the detection of network traffic anomalies, accurate automated classification is still a very challenging and unmet problem. This paper presents a new algorithm for automated classification of network traffic anomalies. The algorithm relies on three st...
متن کاملA MATLAB® Toolkit for Spatial and Temporal Analysis of Network Traffic Anomalies and a Simulator/Emulator for Network Traffic Anomalies
An easily customizable toolkit used to reveal spatial and temporal properties of network traffic traces and a simulator/emulator that regenerates anomalies having statistically similar anomalies to real networks is developed. The analyzer toolkit is fed with network traces as inputs, and anomalies are identified along with their properties. The toolkit uses Fourier analysis to suppress prominen...
متن کاملSketch-based Network-wide Traffic Anomaly Detection
Internet has become an essential part of the daily life for billions of users worldwide, who are using a large variety of network services and applications everyday. However, there have been serious security problems and network failures that are hard to resolve, for example, Botnet attacks, polymorphic worm/virus spreading, DDoS, and flash crowds. To address many of these problems, we need to ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: ACM SIGCOMM Computer Communication Review
سال: 2004
ISSN: 0146-4833
DOI: 10.1145/1030194.1015492