Statistical techniques for detecting traffic anomalies through packet header data

SS Kim, ALN Reddy - IEEE/ACM Transactions on Networking, 2008 - ieeexplore.ieee.org
This paper proposes a traffic anomaly detector, operated in postmortem and in real-time, by
passively monitoring packet headers of traffic. The frequent attacks on network infrastructure …

一种基于灰色神经网络的网络流量预测模型

曹建华, 刘渊, 戴悦 - 计算机工程与应用, 2008 - cqvip.com
网络流量是衡量网络运行负荷和状态的重要参数, 也是网络规划, 流量管理等方面起着重要作用
的重要参数. 在流量管理中, 流量模型用于评价接入控制机制和预测网络性能 …

GARCH—Non-linear time series model for traffic modeling and prediction

NC Anand, C Scoglio… - NOMS 2008-2008 IEEE …, 2008 - ieeexplore.ieee.org
Forecasting of network traffic plays a very important role in many domains such as
congestion control, adaptive applications, network management and traffic engineering. A …

A stratified traffic sampling methodology for seeing the big picture

S Fernandes, C Kamienski, J Kelner, D Mariz… - Computer Networks, 2008 - Elsevier
This work explores the use of statistical techniques, namely stratified sampling and cluster
analysis, as powerful tools for deriving traffic properties at the flow level. Our results show …

Smart predictive trigger for effective handover in wireless networks

SF Chien, H Liu, ALY Low… - 2008 IEEE …, 2008 - ieeexplore.ieee.org
Roaming across heterogeneous wireless networks poses a challenging issue in mobility
management such as seamless and efficient handover to reduce end-user's service …

[PDF][PDF] Detecting distributed network traffic anomaly with network-wide correlation analysis

L Zonglin, H Guangmin, Y Xingmiao, Y Dan - EURASIP Journal on …, 2008 - Springer
Distributed network traffic anomaly refers to a traffic abnormal behavior involving many links
of a network and caused by the same source (eg, DDoS attack, worm propagation). The …

Global abnormal correlation analysis for DDoS attack detection

ZL Li, GM Hu, D Yang - 2008 IEEE Symposium on Computers …, 2008 - ieeexplore.ieee.org
Distributed detection mechanism of DDoS (Distributed Denial of Service) attack is often
achieved by the corporation between many detection nodes, its final detection result largely …

全局的多流量相关异常检测算法

杨丹, 胡光岷, 李宗林, 姚兴苗 - 电子科技大学学报, 2008 - cqvip.com
针对现有单链路流量异常检测和全局流量异常检测方法存在的不足, 该文提出一种全局的多流量
相关异常检测算法. 该算法利用同一异常在不同链路或OD 流所产生的多个异常流量信号在频率 …

Generalized cost-function-based forecasting for periodically measured nonstationary traffic

B Krithikaivasan, Y Zeng… - IEEE Transactions on …, 2008 - ieeexplore.ieee.org
In this paper, we address the issue of forecasting for periodically measured nonstationary
traffic based on statistical time series modeling. Often with time-series-based applications …

Data traffic dynamics and saturation on a single link

RD Smith - arXiv preprint arXiv:0802.3554, 2008 - arxiv.org
The dynamics of User Datagram Protocol (UDP) traffic over Ethernet between two computers
are analyzed using nonlinear dynamics which shows that there are two clear regimes in the …