AbstractIn this paper, a technique for detecting anomalous behavior traffic in a computer network is presented. Entropy space method is based on a 3D-space built on a flow-packet level. The complete set of points obtained in the 3D-space can be seen as a data cloud. Each 3D point in the space is a value of the obtained clusters for each slot of the network traffic. The selected features for the set of points are done by applying Pattern Recognition, Principal Component Analysis, and Kernel Density Estimation. At the next stage, the network traffic can be modelled by using Gaussian Mixtures and Extreme Generalized Distributions, which define the behavior of each selected feature. By integrating this model in an Anomaly-based Intrusion Detect...
Anomalies are unusual and significant changes in a network's traffic levels, which can often involve...
Network anomaly detection and classification is an important open issue in network security. Several...
Anomaly-based Intrusion Detection is a key research topic in network security due to its ability to ...
AbstractIn this paper, a technique for detecting anomalous behavior traffic in a computer network is...
Anomaly-based Intrusion Detection is a key research topic in network security due to its ability to ...
We develop a behavior-based anomaly detection method that detects network anomalies by comparing the...
Network anomaly detection is a broad area of research. The use of entropy and distributions of traff...
Detecting anomalous traffic with low false alarm rates is of primary interest in IP networks managem...
Diagnosing traffic anomalies rapidly and accurately is critical to the efficient operation of large ...
Today, the Internet allows virtually anytime, anywhere access to a seemingly unlimited supply of inf...
AbstractResearch Tools in Anomaly-based Intrusion Detection are highly dependent on appropriate traf...
The increasing practicality of large-scale flow capture makes it possible to conceive of traffic ana...
The problem of traffic anomalies in computer networks is analyzed. NetFlow packets are used as netwo...
The increasing practicality of large-scale flow capture makes it possible to conceive of traffic ana...
Real time anomaly detection is important to performance and efficiency in many areas. This paper off...
Anomalies are unusual and significant changes in a network's traffic levels, which can often involve...
Network anomaly detection and classification is an important open issue in network security. Several...
Anomaly-based Intrusion Detection is a key research topic in network security due to its ability to ...
AbstractIn this paper, a technique for detecting anomalous behavior traffic in a computer network is...
Anomaly-based Intrusion Detection is a key research topic in network security due to its ability to ...
We develop a behavior-based anomaly detection method that detects network anomalies by comparing the...
Network anomaly detection is a broad area of research. The use of entropy and distributions of traff...
Detecting anomalous traffic with low false alarm rates is of primary interest in IP networks managem...
Diagnosing traffic anomalies rapidly and accurately is critical to the efficient operation of large ...
Today, the Internet allows virtually anytime, anywhere access to a seemingly unlimited supply of inf...
AbstractResearch Tools in Anomaly-based Intrusion Detection are highly dependent on appropriate traf...
The increasing practicality of large-scale flow capture makes it possible to conceive of traffic ana...
The problem of traffic anomalies in computer networks is analyzed. NetFlow packets are used as netwo...
The increasing practicality of large-scale flow capture makes it possible to conceive of traffic ana...
Real time anomaly detection is important to performance and efficiency in many areas. This paper off...
Anomalies are unusual and significant changes in a network's traffic levels, which can often involve...
Network anomaly detection and classification is an important open issue in network security. Several...
Anomaly-based Intrusion Detection is a key research topic in network security due to its ability to ...