Network Anomaly Detection based on Multi-scale Dynamic Characteristics of Traffic

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Network Traffic Anomaly Detection

This paper presents a tutorial for network anomaly detection, focusing on non-signature-based approaches. Network traffic anomalies are unusual and significant changes in the traffic of a network. Networks play an important role in today’s social and economic infrastructures. The security of the network becomes crucial, and network traffic anomaly detection constitutes an important part of netw...

متن کامل

Sketch-based Network-wide Traffic Anomaly Detection

Internet has become an essential part of the daily life for billions of users worldwide, who are using a large variety of network services and applications everyday. However, there have been serious security problems and network failures that are hard to resolve, for example, Botnet attacks, polymorphic worm/virus spreading, DDoS, and flash crowds. To address many of these problems, we need to ...

متن کامل

Network Traffic Anomaly Detection Based on N-ARMA Model

With the rapid development of the Internet and the continuous expanding of the data network, little potential anomaly can seriously affect the normal operation of the network, and even lead to huge economic losses. In order to be more accurate and efficient in the traffic detection, in this paper, we propose an N-ARMA based traffic anomaly detection model. We also conduct extensive experiments ...

متن کامل

Network Traffic Anomaly Detection based on Ratio and Volume Analysis

Recent attack targets on a public network as well as an enterprise/edge network or system because the damage of the public network-attack is far stronger than an enterprise network or systems-attack and the speed of its propagation is far faster. Theses attacks typically cause not only traffic congestion but also network failure exhausting network bandwidth, router processing capacity using the...

متن کامل

Anomaly secure detection methods by analyzing dynamic characteristics of the network traffic in cloud communications

Cloud computing represents a new paradigm where computing resources are offered as services in the world via communication Internet. As many new types of attacks are arising at a high frequency, the cloud computing services are exposed to an increasing amount of security threats. To reduce security risks, two approaches of the network traffic anomaly detection in cloud communications have been ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: INTERNATIONAL JOURNAL OF COMPUTERS COMMUNICATIONS & CONTROL

سال: 2014

ISSN: 1841-9844,1841-9836

DOI: 10.15837/ijccc.2014.1.870