The prosperity of mobile networks and social networks brings revolutionary conveniences to our daily lives. However, due to the complexity and fragility of the network environment, network attacks are becoming more and more serious. Characterization of network traffic is commonly used to model and detect network anomalies and finally to raise the cybersecurity awareness capability of network administrators. As a tool to characterize system running status, entropy-based time-series complexity measurement methods such as Multiscale Entropy (MSE), Composite Multiscale Entropy (CMSE), and Fuzzy Approximate Entropy (FuzzyEn) have been widely used in anomaly detection. However, the existing methods calculate the distance between vectors solely us...
Detecting anomalous traffic with low false alarm rates is of primary interest in IP networks managem...
The problem of traffic anomalies in computer networks is analyzed. NetFlow packets are used as netwo...
A number of network features is used to describe normal and intrusive traffic patterns. However the ...
Network anomaly detection is a broad area of research. The use of entropy and distributions of traff...
Distributed Denial-of-Service (DDoS) attacks are a serious threat to the safety and security of cybe...
Today, the Internet allows virtually anytime, anywhere access to a seemingly unlimited supply of inf...
We develop a behavior-based anomaly detection method that detects network anomalies by comparing the...
In information theory, entropies make up of the basis for distance and divergence measures among var...
Abstract- Many detection techniques against worms, denial of service attacks and botnets on the Inte...
Anomaly-based Intrusion Detection is a key research topic in network security due to its ability to ...
The number and impact of attack over the Internet have been continuously increasing in the last year...
Real time anomaly detection is important to performance and efficiency in many areas. This paper off...
Data mining is an interdisciplinary subfield of computer science involving methods at the intersecti...
The growing number of internet based services and applications along with increasing adoption rate o...
A Honeynet is a network designed by the Honeynet Project organization to gather information on secur...
Detecting anomalous traffic with low false alarm rates is of primary interest in IP networks managem...
The problem of traffic anomalies in computer networks is analyzed. NetFlow packets are used as netwo...
A number of network features is used to describe normal and intrusive traffic patterns. However the ...
Network anomaly detection is a broad area of research. The use of entropy and distributions of traff...
Distributed Denial-of-Service (DDoS) attacks are a serious threat to the safety and security of cybe...
Today, the Internet allows virtually anytime, anywhere access to a seemingly unlimited supply of inf...
We develop a behavior-based anomaly detection method that detects network anomalies by comparing the...
In information theory, entropies make up of the basis for distance and divergence measures among var...
Abstract- Many detection techniques against worms, denial of service attacks and botnets on the Inte...
Anomaly-based Intrusion Detection is a key research topic in network security due to its ability to ...
The number and impact of attack over the Internet have been continuously increasing in the last year...
Real time anomaly detection is important to performance and efficiency in many areas. This paper off...
Data mining is an interdisciplinary subfield of computer science involving methods at the intersecti...
The growing number of internet based services and applications along with increasing adoption rate o...
A Honeynet is a network designed by the Honeynet Project organization to gather information on secur...
Detecting anomalous traffic with low false alarm rates is of primary interest in IP networks managem...
The problem of traffic anomalies in computer networks is analyzed. NetFlow packets are used as netwo...
A number of network features is used to describe normal and intrusive traffic patterns. However the ...