Autonomous profile-based anomaly detection system using principal component analysis and flow analysis

G Fernandes Jr, JJPC Rodrigues, ML Proenca Jr - Applied Soft Computing, 2015 - Elsevier
Different techniques and methods have been widely used in the subject of automatic
anomaly detection in computer networks. Attacks, problems and internal failures when not …

A probabilistic sampling method for efficient flow-based analysis

Z Jadidi, V Muthukkumarasamy… - Journal of …, 2016 - ieeexplore.ieee.org
Network management and anomaly detection are challenges in high-speed networks due to
the high volume of packets that has to be analysed. Flow-based analysis is a scalable …

Network anomaly diagnosis via statistical analysis and evidential reasoning

N Samaan, A Karmouch - IEEE transactions on network and …, 2008 - ieeexplore.ieee.org
This paper investigates the efficiency of diagnosing network anomalies using concepts of
statistical analysis and evidential reasoning. A bi-cycle of auto-regression is first applied to …

Evaluating the Impact of Traffic Sampling on AATAC's DDoS Detection

G Roudière, P Owezarski - Proceedings of the 2018 Workshop on Traffic …, 2018 - dl.acm.org
As Distributed Denial of Service (DDoS) attack are still a severe threat for the Internet
stakeholders, they should be detected with efficient tools meeting industrial requirements. In …

Using selective sampling for the support of scalable and efficient network anomaly detection

G Androulidakis, V Chatzigiannakis… - 2007 IEEE …, 2007 - ieeexplore.ieee.org
Sampling has become an essential component of scalable Internet traffic monitoring and
anomaly detection. In this paper we consider the problem of studying and evaluating the …

The road network evolution analysis of Guangzhou-Foshan metropolitan area based on kernel density estimation

R Liu, WP Hu, H Wang, C Wu - 2010 International Conference …, 2010 - ieeexplore.ieee.org
Based on 1: 50000 topographic maps of 1957 and 1983, and remote sensing images taken
in 1995 and 2008, we extracted, normalized the thematic data of road network, built up a …

A cluster-based approach towards detecting and modeling network dictionary attacks

AT Siahmarzkooh, J Karimpour, S Lotfi - Engineering, Technology & …, 2016 - etasr.com
In this paper, we provide an approach to detect network dictionary attacks using a data set
collected as flows based on which a clustered graph is resulted. These flows provide an …

[PDF][PDF] Impact of adaptive packet sampling on ML-based DDoS detection

S Kopmann, M Zitterbart - 2023 - opus.bibliothek.uni-augsburg.de
Traffic monitoring can react to changing data rates by adapting the fraction of inspected
packets (sampling rate). In this work, we investigate the resilience of a sampling rate …

互联网流采样技术综述

赵小欢, 夏靖波, 朱长虹 - 小型微型计算机系统, 2013 - cqvip.com
网络流量测量对网络管理, 网络监控, 网络设计和网络规划具有重要的意义. 由于网络带宽以摩尔
速率增长, 流采样作为一种以有限资源实时获取网络运行状况的方式引起了广泛的关注 …

Addressing practical challenges for anomaly detection in backbone networks

I Paredes Oliva - 2013 - upcommons.upc.edu
Network monitoring has always been a topic of foremost importance for both network
operators and researchers for multiple reasons ranging from anomaly detection to tra c …