The Internet is highly susceptible to routing attacks and there is no universally deployed solution that ensures that traffic is not hijacked by third parties. Individuals or organizations wanting to protect themselves from sustained attacks must therefore typically rely on measurements and traffic monitoring to detect attacks. Motivated by the high overhead costs of continuous active measurements, we argue that passive monitoring combined with collaborative information sharing and statistics can be used to provide alerts about traffic anomalies that may require further investigation. In this paper we present and evaluate a user-centric crowd-based approach in which users passively monitor their network traffic, share information about pote...
Nowadays, Internet has serious security problems and net-work failures that are hard to resolve, for...
To ensure that services can be delivered reliably and continuously over theInternet, it is important...
Anomaly detection in computer networks yields valuable information on events relating to the compone...
The Internet is highly susceptible to routing attacks and there is no universally deployed solution ...
Early detection of traffic anomalies in networks increases the probability of effective intervention...
Anomaly detection in computer networks yields valuable information on events relating to the compone...
Abstract—Network operators are continuously confronted with malicious events, such as port scans, de...
Traffic anomalies can create network congestion, so its prompt and accurate detection would allow ne...
Traffic anomalies can create network congestion, so its prompt and accurate detection would allow ne...
Recent attack targets on a public network as well as an enterprise/edge network or system because th...
Networks are increasingly subjected to threats that affect the reliability of critical infrastructur...
Computer networks are becoming increasingly important in supporting business and everyday activities...
Computer networks are becoming increasingly important in supporting business and everyday activities...
Network traffic anomalies stand for a large fraction of the Internet traffic andcompromise the perfo...
The Internet is not a safe place. Unsecured hosts can expect to be compromised within minutes of con...
Nowadays, Internet has serious security problems and net-work failures that are hard to resolve, for...
To ensure that services can be delivered reliably and continuously over theInternet, it is important...
Anomaly detection in computer networks yields valuable information on events relating to the compone...
The Internet is highly susceptible to routing attacks and there is no universally deployed solution ...
Early detection of traffic anomalies in networks increases the probability of effective intervention...
Anomaly detection in computer networks yields valuable information on events relating to the compone...
Abstract—Network operators are continuously confronted with malicious events, such as port scans, de...
Traffic anomalies can create network congestion, so its prompt and accurate detection would allow ne...
Traffic anomalies can create network congestion, so its prompt and accurate detection would allow ne...
Recent attack targets on a public network as well as an enterprise/edge network or system because th...
Networks are increasingly subjected to threats that affect the reliability of critical infrastructur...
Computer networks are becoming increasingly important in supporting business and everyday activities...
Computer networks are becoming increasingly important in supporting business and everyday activities...
Network traffic anomalies stand for a large fraction of the Internet traffic andcompromise the perfo...
The Internet is not a safe place. Unsecured hosts can expect to be compromised within minutes of con...
Nowadays, Internet has serious security problems and net-work failures that are hard to resolve, for...
To ensure that services can be delivered reliably and continuously over theInternet, it is important...
Anomaly detection in computer networks yields valuable information on events relating to the compone...