PL EN


Preferencje help
Widoczny [Schowaj] Abstrakt
Liczba wyników
Tytuł artykułu

VoIP Anomaly Detection - selected methods of statistical analysis

Treść / Zawartość
Identyfikatory
Warianty tytułu
Języki publikacji
EN
Abstrakty
EN
Self-similarity analysis and anomaly detection in networks are interesting fields of research and scientific work of scientists around the world. Simulation studies have demonstrated that the Hurst parameter estimation can be used to detect traffic anomaly. The actual network traffic is self-similar or long-range dependent. The dramatic expansion of applications on modern networks gives rise to a fundamental challenge to network security. The Hurst values are compared with confidence intervals of normal values to detect anomaly in VoIP.
Rocznik
Strony
14--19
Opis fizyczny
Bibliogr. 8 poz., rys., tab.
Twórcy
autor
  • Dept. of Power Electronics and Power Engineering and Complex Systems, Rzeszow University of Technology Rzeszow, Poland
autor
  • Dept. of Power Electronics and Power Engineering and Complex Systems, Rzeszow University of Technology Rzeszow, Poland
  • Rzeszow University of Technology Rzeszow, Poland
Bibliografia
  • [1] M. Mazurek, P. Dymora, “Network Anomaly Detection Based on the Statistical Self-similarity Factor”, Analysis and Simulation of Electrical and Computer Systems Lecture Notes in Electrical Engineering Volume 324, Springer, pp 271-287, 2015.
  • [2] M. Mazurek, P. Dymora, “Network anomaly detection based on the statistical self-similarity factor for HTTP protocol”, Przegląd elektrotechniczny, ISSN 0033-2097, R. 90 NR 1/2014, s.127 - 130, 2014.
  • [3] M. Fernandez-Martinez, M.A. Sanchez-Granero, J.E. Trinidad Segovia, “Measuring the self-similarity exponent in Levy stable processes of financial time series”, Physica A 392, Elsevier, pp 5330-5345, 2013.
  • [4] J. Cai, W. X. Liu, “A new Method of detecting network traffic anomalies”, Proceedings of the 2nd International Conference on Computer Science and Electronics Engineering, 2013, pp. 2800 – 2803.
  • [5] P. Dymora, M. Mazurek, D. Strzałka, “Computer network traffic analysis with the use of statistical self-similarity factor”, t.XIII, s.69-81, 2013, Annales Universitatis Mariae Curie-Skłodowska Sectio AI Informatica, z. 2.
  • [6] H. D. Jeong, J. S. Lee, D. McNickle, K. Pawlikowski, “Self-similar properties of malicious teletraffic”, Int. J. Comput. Syst. Sci. Eng., 28 (1), pp. 1–7, 2012.
  • [7] H. Sengar, H. Wang, D. Wijesekera, and S. Jajodia, “Detecting VoIP Floods Using the Hellinger Distance”, IEEE Transactions on Parallel and Distributed Systems, Vol. 19, No. 6, pp. 794–805, 2008.
  • [8] F. Mata, J. Aracil, and J. L. García-Dorado, “Automated detection of load changes in large-scale networks,” in Proceedings of TMA, 2009, pp. 34–41.
Typ dokumentu
Bibliografia
Identyfikator YADDA
bwmeta1.element.baztech-b4172d40-791b-4c26-92db-3903db76b1de
JavaScript jest wyłączony w Twojej przeglądarce internetowej. Włącz go, a następnie odśwież stronę, aby móc w pełni z niej korzystać.