Operational experiences with anomaly detection in backbone networks
نویسندگان
چکیده
منابع مشابه
Operational experiences with anomaly detection in backbone networks
Although network security is a crucial aspect for network operators, there are still very few works that have examined the anomalies present in large backbone networks and evaluated the performance of existing anomaly detection solutions in operational environments. The objective of this work is to fill this gap by reporting hands-on experience in the evaluation and deployment of an anomaly det...
متن کاملAddressing Practical Challenges for Anomaly Detection in Backbone Networks
Network monitoring has always been a topic of foremost importance for both network operators and researchers for multiple reasons ranging from anomaly detection to traffic classification or capacity planning. Nowadays, as networks become more and more complex, traffic increases and security threats reproduce, achieving a deeper understanding of what is happening in the network has become an ess...
متن کاملAnomaly Detection in Networks with Changing Trends
Dynamic networks, also called network streams, are an important data representation that applies to many real-world domains. Many sets of network data such as e-mail networks, social networks, or internet traffic networks have been analyzed in the past mostly using static network models and are better represented by a dynamic network due to the temporal component of the data. One important appl...
متن کاملAnomaly detection in IP networks
Network anomaly detection is a vibrant research area. Researchers have approached this problem using various techniques such as artificial intelligence, machine learning, and state machine modeling. In this paper, we first review these anomaly detection methods and then describe in detail a statistical signal processing technique based on abrupt change detection. We show that this signal proces...
متن کاملADAPTIVE ORDERED WEIGHTED AVERAGING FOR ANOMALY DETECTION IN CLUSTER-BASED MOBILE AD HOC NETWORKS
In this paper, an anomaly detection method in cluster-based mobile ad hoc networks with ad hoc on demand distance vector (AODV) routing protocol is proposed. In the method, the required features for describing the normal behavior of AODV are defined via step by step analysis of AODV and independent of any attack. In order to learn the normal behavior of AODV, a fuzzy averaging method is used fo...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Computers & Security
سال: 2012
ISSN: 0167-4048
DOI: 10.1016/j.cose.2012.01.009