The quantification of normal and anomalous traffic flows across computer networks is a topic of pervasive interest in network se- curity, and requires the timely application of time-series methods. The transmission or reception of packets passing between computers can be represented in terms of time-stamped events and the resulting activity understood in terms of point-processes. Interestingly, in the disparate do- main of neuroscience, models for describing dependent point-processes are well developed. In particular, spectral methods which decompose second-order dependency across different frequencies allow for a rich characterisation of point-processes. In this paper, we investigate using the spectral coherence statistic to characterise c...
The paper presents joint measurements of IP and ATM traffic over an MPOA based campus network. The s...
The detection of anomalies in network traffic is an important task in today’s Internet. Among variou...
This paper explores the use of spectral or frequency domain analysis to examine network evolution an...
The quantification of normal and anomalous traffic flows across computer networks is a topic of perv...
To perform robust statistical anomaly detection in cybersecurity, we must build realistic models of ...
Anomaly detection for cyber security defence has received much attention in recent years, providing ...
Consider an infinite-source marked Poisson process to model end user inputs to a data network. At Po...
Connectivity patterns between nodes in a computer network can be interpreted and modelled as point p...
To respond rapidly and accurately to network and service outages, network operators must deal with a...
We investigate where and how key dependency structure between measures of network activity change th...
In this paper we examine rigorously the evidence for dependence among data size, transfer rate and d...
Undoubtedly, the characterisation of network traffic flows is vitally important in understanding the...
This paper provides a deep analysis of long-range dependence in a continually evolving Internet traf...
It is now widely accepted that packet network traffic exhibits long-range dependence (LRD), and this...
The paper presents joint measurements of IP and ATM traffic over an MPOA based campus network. The s...
The paper presents joint measurements of IP and ATM traffic over an MPOA based campus network. The s...
The detection of anomalies in network traffic is an important task in today’s Internet. Among variou...
This paper explores the use of spectral or frequency domain analysis to examine network evolution an...
The quantification of normal and anomalous traffic flows across computer networks is a topic of perv...
To perform robust statistical anomaly detection in cybersecurity, we must build realistic models of ...
Anomaly detection for cyber security defence has received much attention in recent years, providing ...
Consider an infinite-source marked Poisson process to model end user inputs to a data network. At Po...
Connectivity patterns between nodes in a computer network can be interpreted and modelled as point p...
To respond rapidly and accurately to network and service outages, network operators must deal with a...
We investigate where and how key dependency structure between measures of network activity change th...
In this paper we examine rigorously the evidence for dependence among data size, transfer rate and d...
Undoubtedly, the characterisation of network traffic flows is vitally important in understanding the...
This paper provides a deep analysis of long-range dependence in a continually evolving Internet traf...
It is now widely accepted that packet network traffic exhibits long-range dependence (LRD), and this...
The paper presents joint measurements of IP and ATM traffic over an MPOA based campus network. The s...
The paper presents joint measurements of IP and ATM traffic over an MPOA based campus network. The s...
The detection of anomalies in network traffic is an important task in today’s Internet. Among variou...
This paper explores the use of spectral or frequency domain analysis to examine network evolution an...