Diagnosing network-wide traffic anomalies

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

SYNERGY: Detecting and Diagnosing Correlated Network Anomalies

Network anomalies occur in operational networks and may be logged by a number of network measurement tools such as SNMP and NetFlow. However, accurate and efficient detection of these anomalies in the logged data is very challenging due to the huge data volume and complex characteristics of anomalies. The existing approaches are limited by the nature of underlying mathematical models and might ...

متن کامل

Risk Leveling of Network Traffic Anomalies

The goal of intrusion detection is to identify attempted or ongoing attacks on a computer system or network. Many attacks aim to compromise computer networks in an online manner. Traffic anomalies have been an important indication of such attacks. Challenges in the detections lie in modeling of the large continuous streams of data and performing anomaly detection in an online manner. This paper...

متن کامل

Automated Classification of Network Traffic Anomalies

Network traffic anomalies detection and characterization has been a hot topic of research for many years. Although the field is very advanced in the detection of network traffic anomalies, accurate automated classification is still a very challenging and unmet problem. This paper presents a new algorithm for automated classification of network traffic anomalies. The algorithm relies on three st...

متن کامل

A MATLAB® Toolkit for Spatial and Temporal Analysis of Network Traffic Anomalies and a Simulator/Emulator for Network Traffic Anomalies

An easily customizable toolkit used to reveal spatial and temporal properties of network traffic traces and a simulator/emulator that regenerates anomalies having statistically similar anomalies to real networks is developed. The analyzer toolkit is fed with network traces as inputs, and anomalies are identified along with their properties. The toolkit uses Fourier analysis to suppress prominen...

متن کامل

Sketch-based Network-wide Traffic Anomaly Detection

Internet has become an essential part of the daily life for billions of users worldwide, who are using a large variety of network services and applications everyday. However, there have been serious security problems and network failures that are hard to resolve, for example, Botnet attacks, polymorphic worm/virus spreading, DDoS, and flash crowds. To address many of these problems, we need to ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: ACM SIGCOMM Computer Communication Review

سال: 2004

ISSN: 0146-4833

DOI: 10.1145/1030194.1015492