There is an increasing consensus that the locator/identifier separation of IP address is necessary to resolve the scalability issues of current Internet routing architecture. After identifiers are separated from locators, an identifier-to-locator mapping service must be employed to map identifiers onto locators. From this point, this paper proposes an anomaly detection and response approach based on mapping requests. By using the cumulative sum algorithm for change point detection, this approach introduces the anomalous traffic detection of mapping requests to diagnose the aberrant network behaviors. Once alarming, two effective response methods can be chosen to control the anomalous attack traffic in real time. Furthermore, in order to dec...
Internet utilisation has steadily increased, predominantly due to the rapid recent development of in...
Computer networks are becoming increasingly important in supporting business and everyday activities...
The increasing number of network attacks causes growing problems for network operators and users. Th...
There is an increasing consensus that the locator/identifier separation of IP address is necessary t...
In this paper, we present the design and implementation of a new approach for anomaly detection and ...
International audienceThis paper provides a new framework for efficient detection and identification...
Abstract. This paper provides a new framework for efficient detection and identification of network ...
The extreme volumes of modern networks and the increasing demands on security professionals present ...
Today’s evolving networks are experiencing a large number of different attacks ranging from system b...
With the popularity of the Internet, more and more businesses and transactions rely on the network t...
Traffic anomalies can create network congestion, so its prompt and accurate detection would allow ne...
The increasing number of network attacks causes growing problems for network operators and users. Th...
Abstract: New datamining techniques are developed for generating frequent episode rules of traffic e...
Abstract:- A new approach of anomaly intrusion detection (AID) is proposed in this paper. The Self-O...
Denial of service attacks constitute one of the greatest problem in network security. Monitoring tra...
Internet utilisation has steadily increased, predominantly due to the rapid recent development of in...
Computer networks are becoming increasingly important in supporting business and everyday activities...
The increasing number of network attacks causes growing problems for network operators and users. Th...
There is an increasing consensus that the locator/identifier separation of IP address is necessary t...
In this paper, we present the design and implementation of a new approach for anomaly detection and ...
International audienceThis paper provides a new framework for efficient detection and identification...
Abstract. This paper provides a new framework for efficient detection and identification of network ...
The extreme volumes of modern networks and the increasing demands on security professionals present ...
Today’s evolving networks are experiencing a large number of different attacks ranging from system b...
With the popularity of the Internet, more and more businesses and transactions rely on the network t...
Traffic anomalies can create network congestion, so its prompt and accurate detection would allow ne...
The increasing number of network attacks causes growing problems for network operators and users. Th...
Abstract: New datamining techniques are developed for generating frequent episode rules of traffic e...
Abstract:- A new approach of anomaly intrusion detection (AID) is proposed in this paper. The Self-O...
Denial of service attacks constitute one of the greatest problem in network security. Monitoring tra...
Internet utilisation has steadily increased, predominantly due to the rapid recent development of in...
Computer networks are becoming increasingly important in supporting business and everyday activities...
The increasing number of network attacks causes growing problems for network operators and users. Th...