Flow-based statistical aggregation schemes for network anomaly detection

S Song, L Ling, CN Manikopoulo - 2006 IEEE International …, 2006 - ieeexplore.ieee.org
In this paper, we present a novel Flow-based Statistical Aggregation Schemes (FSAS) for
Network Anomaly Detection. An IP flow is a unidirectional series of IP packets of a given …

Flexible flow aggregation for adaptive network monitoring

F Dressler, G Munz - … . 2006 31st ieee conference on local …, 2006 - ieeexplore.ieee.org
Network monitoring is a major building block for many domains in communication networks.
Besides typical accounting mechanisms and the emerging area of charging in next …

Adaptive flow aggregation-a new solution for robust flow monitoring under security attacks

Y Hu, DM Chiu, JCS Lui - 2006 IEEE/IFIP Network Operations …, 2006 - ieeexplore.ieee.org
Flow-level traffic measurement is required for a wide range of applications including
accounting, network planning and security management. A key design challenge is how to …

Network anomaly detection with incomplete audit data

A Patcha, JM Park - Computer Networks, 2007 - Elsevier
With the ever increasing deployment and usage of gigabit networks, traditional network
anomaly detection based Intrusion Detection Systems (IDS) have not scaled accordingly …

Multi-granular aggregation of network flows for security analysis

T Ding, A AlEroud, G Karabatis - 2015 IEEE international …, 2015 - ieeexplore.ieee.org
Investigating network flows is an approach of detecting attacks by identifying known
patterns. Flow statistics are used to discover anomalies by aggregating network traces and …

Challenging the supremacy of traffic matrices in anomaly detection

A Soule, F Silveira, H Ringberg, C Diot - Proceedings of the 7th ACM …, 2007 - dl.acm.org
Multiple network-wide anomaly detection techniques proposed in the literature define an
anomaly as a statistical outlier in aggregated network traffic. The most popular way to …

Unada: Unsupervised network anomaly detection using sub-space outliers ranking

P Casas, J Mazel, P Owezarski - … 2011: 10th International IFIP TC 6 …, 2011 - Springer
Current network monitoring systems rely strongly on signa-ture-based and supervised-
learning-based detection methods to hunt out network attacks and anomalies. Despite being …

Detection network anomalies based on packet and flow analysis

H Wang, Z Gong, Q Guan… - … Conference on Networking …, 2008 - ieeexplore.ieee.org
Anomalies generate vast amounts of bogus traffic, which can overwhelm the network and
any attached hosts. Identifying traffic anomalies rapidly and accurately is critical to network …

Creating novel features to anomaly network detection using DARPA-2009 data set

N Moustaf, J Slay - … of the 14th European Conference on Cyber …, 2015 - books.google.com
The increased usage of Internet, E-business, and social network enables attack behaviour
with diverse fashions. A Network Intrusion Detection System (NIDS) is software which can …

A flow-based anomaly detection method using entropy and multiple traffic features

S Chang, X Qiu, Z Gao, F Qi… - 2010 3rd IEEE International …, 2010 - ieeexplore.ieee.org
Network traffic anomaly detection is an important component in network security and
management domains which can help to improve availability and reliability of networks. This …