Identyfikatory
Warianty tytułu
Języki publikacji
Abstrakty
Self-similarity analysis and anomaly detection in networks are interesting fields of research and scientific work of scientists around the world. Simulation studies have demonstrated that the Hurst parameter estimation can be used to detect traffic anomaly. The actual network traffic is self-similar or long-range dependent. The dramatic expansion of applications on modern networks gives rise to a fundamental challenge to network security. The Hurst values are compared with confidence intervals of normal values to detect anomaly in VoIP.
Słowa kluczowe
Wydawca
Rocznik
Tom
Strony
14--19
Opis fizyczny
Bibliogr. 8 poz., rys., tab.
Twórcy
autor
- Dept. of Power Electronics and Power Engineering and Complex Systems, Rzeszow University of Technology Rzeszow, Poland
autor
- Dept. of Power Electronics and Power Engineering and Complex Systems, Rzeszow University of Technology Rzeszow, Poland
autor
- Rzeszow University of Technology Rzeszow, Poland
Bibliografia
- [1] M. Mazurek, P. Dymora, “Network Anomaly Detection Based on the Statistical Self-similarity Factor”, Analysis and Simulation of Electrical and Computer Systems Lecture Notes in Electrical Engineering Volume 324, Springer, pp 271-287, 2015.
- [2] M. Mazurek, P. Dymora, “Network anomaly detection based on the statistical self-similarity factor for HTTP protocol”, Przegląd elektrotechniczny, ISSN 0033-2097, R. 90 NR 1/2014, s.127 - 130, 2014.
- [3] M. Fernandez-Martinez, M.A. Sanchez-Granero, J.E. Trinidad Segovia, “Measuring the self-similarity exponent in Levy stable processes of financial time series”, Physica A 392, Elsevier, pp 5330-5345, 2013.
- [4] J. Cai, W. X. Liu, “A new Method of detecting network traffic anomalies”, Proceedings of the 2nd International Conference on Computer Science and Electronics Engineering, 2013, pp. 2800 – 2803.
- [5] P. Dymora, M. Mazurek, D. Strzałka, “Computer network traffic analysis with the use of statistical self-similarity factor”, t.XIII, s.69-81, 2013, Annales Universitatis Mariae Curie-Skłodowska Sectio AI Informatica, z. 2.
- [6] H. D. Jeong, J. S. Lee, D. McNickle, K. Pawlikowski, “Self-similar properties of malicious teletraffic”, Int. J. Comput. Syst. Sci. Eng., 28 (1), pp. 1–7, 2012.
- [7] H. Sengar, H. Wang, D. Wijesekera, and S. Jajodia, “Detecting VoIP Floods Using the Hellinger Distance”, IEEE Transactions on Parallel and Distributed Systems, Vol. 19, No. 6, pp. 794–805, 2008.
- [8] F. Mata, J. Aracil, and J. L. García-Dorado, “Automated detection of load changes in large-scale networks,” in Proceedings of TMA, 2009, pp. 34–41.
Typ dokumentu
Bibliografia
Identyfikator YADDA
bwmeta1.element.baztech-b4172d40-791b-4c26-92db-3903db76b1de