메뉴 건너뛰기




Volumn , Issue , 2009, Pages 449-454

Network anomaly detection based on traffic prediction

Author keywords

Anomaly detection; Network traffic prediction; Wavelet transform

Indexed keywords

ABRUPT CHANGE; ANOMALY DETECTION; ANOMALY-DETECTION ALGORITHMS; HAAR WAVELET TRANSFORM; MULTI-LEVEL; NETWORK ANOMALY DETECTION; NETWORK TRAFFIC; NETWORK TRAFFIC PREDICTION; ORIGINAL SIGNAL; RESIDUAL RATIOS; TIME-SCALES; TRAFFIC ANOMALIES; TRAFFIC DATA; TRAFFIC PREDICTION;

EID: 72449205129     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/EmbeddedCom-ScalCom.2009.86     Document Type: Conference Paper
Times cited : (1)

References (15)
  • 4
    • 0343822522 scopus 로고    scopus 로고
    • Adaptive thresholding for proactive network problem detection
    • Newport, Rhode Island
    • Throttan M, Ji C. Adaptive thresholding for proactive network problem detection. IEEE International Workshop on Systems Management. Newport, Rhode Island, 1998. 108-116
    • (1998) IEEE International Workshop on Systems Management , pp. 108-116
    • Throttan, M.1    Ji, C.2
  • 5
    • 0344899201 scopus 로고    scopus 로고
    • Time Detection Method for Network Traffic Anomalies
    • ZOU Bo-xian. A Real Time Detection Method for Network Traffic Anomalies, Chinese Journal of Computer, 2003, 26(8): 940-947.
    • (2003) Chinese Journal of Computer , vol.26 , Issue.8 , pp. 940-947
    • Bo-xian, Z.O.U.1    Real, A.2
  • 6
    • 20444382020 scopus 로고    scopus 로고
    • Detecting Distributed Denial of Service Attacks Based on Time Series Analysis
    • Sun Qin-dong, Zhang De-yun, Gao Peng. Detecting Distributed Denial of Service Attacks Based on Time Series Analysis. Chinese Journal of Computer, 2005.28(5):767-773.
    • (2005) Chinese Journal of Computer , vol.28 , Issue.5 , pp. 767-773
    • Sun, Q.-D.1    Zhang, D.-Y.2    Peng, G.3
  • 7
    • 0029323403 scopus 로고
    • Wide area traffic - the failure of Poisson modeling
    • Vern Paxson, Sally Floyd. Wide area traffic - the failure of Poisson modeling. IEEE/ACM Transactions on Networking, 1995, 3, 226-244.
    • (1995) IEEE/ACM Transactions on Networking , vol.3 , pp. 226-244
    • Paxson, V.1    Floyd, S.2
  • 8
    • 0027680633 scopus 로고
    • Wavelet-based representations for the 1/f family of fractal process
    • G. Wornell, Wavelet-based representations for the 1/f family of fractal process, Proc. IEEE, 1993, 81: 1428-1450.
    • (1993) Proc. IEEE , vol.81 , pp. 1428-1450
    • Wornell, G.1
  • 9
    • 0035680331 scopus 로고    scopus 로고
    • Anomaly detection in communication networks using wavelets
    • Alarcon V, Barria J A. Anomaly detection in communication networks using wavelets. IEE Proceedings Communications, 2001, 148(6):355-362.
    • (2001) IEE Proceedings Communications , vol.148 , Issue.6 , pp. 355-362
    • Alarcon, V.1    Barria, J.A.2
  • 13
    • 84893496533 scopus 로고    scopus 로고
    • Brutlag, J. D. Aberrant behavior detection in time series for network service monitoring. In Proceeding of the 14th Systems Administration Conference (2000), pp. 139-146.
    • Brutlag, J. D. Aberrant behavior detection in time series for network service monitoring. In Proceeding of the 14th Systems Administration Conference (2000), pp. 139-146.
  • 14
  • 15
    • 72449146653 scopus 로고    scopus 로고
    • LLDOS Dataset. http://www.ll.mit.edu/IST/ideval/index.html, 2008.
    • (2008) LLDOS Dataset


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.