Diagnosing traffic anomalies rapidly and accurately is critical to the efficient operation of large computer networks. However, it is still a challenge for network administrators. One problem is that the amount of traf-fic data does not allow real-time analysis of details. Another problem is that some generic detection metrics possess lower capabilities on diagnosing anomalies. To overcome these problems, we propose a system model with an explicit algorithm to perform on-line traffic analysis. In this scheme, we first make use of de-gree distributions to effectively profile traffic features, and then use the entropy to determine and report changes of degree distributions, which changes of entropy values can accurately differentiate a massiv...
The number and impact of attack over the Internet have been continuously increasing in the last year...
MasterIn recent years, network traffic anomaly detection has become an important area for both acade...
Abstract—In the backbone of large-scale networks, origin-to-destination (OD) traffic flows experienc...
We develop a behavior-based anomaly detection method that detects network anomalies by comparing the...
Today, the Internet allows virtually anytime, anywhere access to a seemingly unlimited supply of inf...
The problem of traffic anomalies in computer networks is analyzed. NetFlow packets are used as netwo...
Network anomaly detection is a broad area of research. The use of entropy and distributions of traff...
Detecting anomalous traffic with low false alarm rates is of primary interest in IP networks managem...
AbstractIn this paper, a technique for detecting anomalous behavior traffic in a computer network is...
The increasing practicality of large-scale flow capture makes it possible to conceive of traffic ana...
The increasing practicality of large-scale flow capture makes it possible to conceive of traffic ana...
Abstract. Network traffic anomalies detection and characterization has been a hot topic of research ...
In this article, we address the problem of not only id entifying phenomena, but also attributing the...
Detecting massive network events like worm out-breaks in fast IP networks, such as Internet backbone...
Abstract- Many detection techniques against worms, denial of service attacks and botnets on the Inte...
The number and impact of attack over the Internet have been continuously increasing in the last year...
MasterIn recent years, network traffic anomaly detection has become an important area for both acade...
Abstract—In the backbone of large-scale networks, origin-to-destination (OD) traffic flows experienc...
We develop a behavior-based anomaly detection method that detects network anomalies by comparing the...
Today, the Internet allows virtually anytime, anywhere access to a seemingly unlimited supply of inf...
The problem of traffic anomalies in computer networks is analyzed. NetFlow packets are used as netwo...
Network anomaly detection is a broad area of research. The use of entropy and distributions of traff...
Detecting anomalous traffic with low false alarm rates is of primary interest in IP networks managem...
AbstractIn this paper, a technique for detecting anomalous behavior traffic in a computer network is...
The increasing practicality of large-scale flow capture makes it possible to conceive of traffic ana...
The increasing practicality of large-scale flow capture makes it possible to conceive of traffic ana...
Abstract. Network traffic anomalies detection and characterization has been a hot topic of research ...
In this article, we address the problem of not only id entifying phenomena, but also attributing the...
Detecting massive network events like worm out-breaks in fast IP networks, such as Internet backbone...
Abstract- Many detection techniques against worms, denial of service attacks and botnets on the Inte...
The number and impact of attack over the Internet have been continuously increasing in the last year...
MasterIn recent years, network traffic anomaly detection has become an important area for both acade...
Abstract—In the backbone of large-scale networks, origin-to-destination (OD) traffic flows experienc...