Abstract. We propose a traffic anomaly detector operated in postmortem and real-time by passively monitoring packet headers of traffic. We analyze the correlation of destination IP addresses of outgoing traffic at an egress router. Based on statistical bounds on normal traffic patterns of the correlation signal of destination addresses, sudden changes can be used to detect anomalies in traffic behavior. For more computational efficiency, we suggest a correlation calculation using a simple data structure. These correlation data are processed through coefficientselective discrete wavelet transform for effective and high-confidence detection. We present two kinds of mechanisms for postmortem and real-time detection modes. We evaluate the effec...
Network traffic anomalies stand for a large fraction of the Internet traffic andcompromise the perfo...
International audienceWe present a new anomaly detector for data traffic, `SMS', based on combining ...
International audienceWe present a new anomaly detector for data traffic, `SMS', based on combining ...
The frequent and large-scale network attacks have led to an increased need for developing techniques...
The aim of this research is to analyze aggregate network traffic for anomaly detection. The accurate...
The paper proposes how to detect network traffic anomalies through packet header data. In this the s...
Abstract: This paper proposes a novel detection engine, called the Wavelet-Recurrence-Clustering (WR...
Abstract—Real time network monitoring for intrusions is offered by various host and network based in...
In the last few years, the number and impact of security attacks over the Internet have been continu...
The network traffic analysis is a fundamental area on network management because the network anomali...
The network traffic analysis is a fundamental area on network management because the network anomali...
The rising complexity of network anomalies necessitates increased attention to developing new techni...
Abstract — Automated detection of anomalies in network traffic is an important and challenging task....
Signal processing techniques have been applied recently for analyzing and detecting network anomalie...
International audienceWe present a new anomaly detector for data traffic, `SMS', based on combining ...
Network traffic anomalies stand for a large fraction of the Internet traffic andcompromise the perfo...
International audienceWe present a new anomaly detector for data traffic, `SMS', based on combining ...
International audienceWe present a new anomaly detector for data traffic, `SMS', based on combining ...
The frequent and large-scale network attacks have led to an increased need for developing techniques...
The aim of this research is to analyze aggregate network traffic for anomaly detection. The accurate...
The paper proposes how to detect network traffic anomalies through packet header data. In this the s...
Abstract: This paper proposes a novel detection engine, called the Wavelet-Recurrence-Clustering (WR...
Abstract—Real time network monitoring for intrusions is offered by various host and network based in...
In the last few years, the number and impact of security attacks over the Internet have been continu...
The network traffic analysis is a fundamental area on network management because the network anomali...
The network traffic analysis is a fundamental area on network management because the network anomali...
The rising complexity of network anomalies necessitates increased attention to developing new techni...
Abstract — Automated detection of anomalies in network traffic is an important and challenging task....
Signal processing techniques have been applied recently for analyzing and detecting network anomalie...
International audienceWe present a new anomaly detector for data traffic, `SMS', based on combining ...
Network traffic anomalies stand for a large fraction of the Internet traffic andcompromise the perfo...
International audienceWe present a new anomaly detector for data traffic, `SMS', based on combining ...
International audienceWe present a new anomaly detector for data traffic, `SMS', based on combining ...