Time-Frequency Detection Algorithm of Network Traffic Anomalies
|
|
|
- Everett Stafford
- 9 years ago
- Views:
Transcription
1 2012 International Conference on Innovation and Information Management (ICIIM 2012) IPCSIT vol. 36 (2012) (2012) IACSIT Press, Singapore Time-Frequency Detection Algorithm of Network Traffic Anomalies Dingde Jiang 1, 2, a+, Wenda Qin 1, Laisen Nie 1, Cheng Yao 1, and Rongfang Lin 1 1 College of Information Science and Engineering, Northeastern University, Shenyang , China 2 State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing , China Abstract. Abnormal network traffic results in a very great harm to our current communication networks, so we need to quickly detect anomalous or malicious traffic in a network. However, the existing detection methods hold a lot of computational overhead and detection errors, which will make it significantly difficult to meet the detection requirements of anomalous network traffic. This paper presents a novel detection algorithm of network traffic anomalies based on time-frequency analysis and statistic theory. We use the discrete wavelet transform to capture the time-frequency nature of network traffic. And then the nature of its low and high frequency is discussed in details. We further analyze its statistic properties in the different scales based on the sliding time window. At the same time, the abnormal nature of network traffic is extracted and the anomaly detection is performed correctly for network traffic. Simulation results indicate that our detection algorithm is feasible and effective. Keywords: network traffic; time-frequency analysis; anomaly detection; statistic analysis 1. Introduction With the rapid development of communication networks, network attacks, network viruses, and other abnormal network behavior often lead to network performance degradation or even make our networks impossible to operate normally [1]. Hence, how to establish an effective network anomaly detection approach to ensure the network communications efficient and reliable is currently becoming a hot research topic. Generally speaking, network anomaly behaviors often cause abnormal changes in the network traffic, so how to accurately detect abnormal traffic is an effective and feasible way for network operators to detect network anomalies, network fault, and network attacks [2, 3]. However, compared to the background traffic, the abnormal traffic is very small, holds unexpected features [4, 5], and shows short duration nature in the time [6, 7]. Therefore, nowadays researchers are interested in finding an accurate detection approach to the abnormal network traffic. Traffic anomaly detection uses active detection methods to detect anomalies in the network traffic. Piotr et al. [3] used the combined use of wavelet transforms and change-point detection algorithms in order to detect the instants when fractality changes noticeably. Wang et al. [5] proposed a ternary content addressable memory coprocessor based solution for high speed, integrated TCP flow anomaly detection and policy filtering. Kriangkrai et al. [8] used a statistic-based anomaly detection method. Abdun et al. [9] exploited a resource conserving sampling technique to improve detection of less frequent patterns from huge network traffic under the fixed data storage capacity of the system. Marius [10] used the analytical discrete wavelet transform and high-order statistic analysis to detect network traffic anomaly. Anitha [11] used active and passive analysis mechanisms when deployed at the host and active analysis at checkpoints. + Corresponding author address: a [email protected] 103
2 Different from the above methods, this paper proposes a novel detection algorithm of network traffic anomaly based on time-frequency analysis and statistic theory. Firstly, the discrete wavelet transform is exploited to capture accurately the time-frequency characteristics of network traffic. By decomposing network traffic into the different scales, we discuss and analyze the properties of its low and high frequency in details. Secondly, we further analyze its statistic properties in the different scales based on the sliding time window. And according to every sliding time window, we calculate the sample variation in the given time. Consequently, we accurately obtain the variation series in the corresponding scale. Thirdly, we computer the mean and variation of this series and decide the threshold of extracting the scale feature of anomalous network traffic. By capture the scale nature of abnormal traffic, we reconstruct its time signals. And then we can carry out the accurate anomaly detection. Finally, we use the traffic data from the real network to validate our algorithm. Simulation results indicate that our detection algorithm is feasible and effective. 2. Problem Statement Fig.1: Discrete wavelet decomposition of signals. Network traffic has highly dynamic characteristics, which is difficult to be depicted. Moreover, network traffic also holds the temporal correlations. How to capture its inherent properties and extract the needed nature is a challenge. For this purpose, we employ the time-frequency analysis to analyze its joint time and frequency feature and perform the feature extraction. Here, we utilize the discrete wavelet transform to carry out the time-frequency analysis and feature extraction. Through decomposing network traffic into the different scales, its scale nature and time- frequency feature can be exhibited exactly. This is helpful to seize the abnormal properties of network traffic. For a time series f () t, its discrete wavelet transform can be denoted as follows: + m/2 m ϕmn, ϕ mn, (1) F( a, b) = f ( t) ( t) dt, and ( t) = a ( a t nb ) where a represents a scale and b denotes the position, and they are satisfied with: m m a = a, and b = na b According to the wavelet analysis theory, for a discrete wavelet transform Fab (, ), its inverse transform can easily be expressed as: mn, mn, f () t = F( a, b) ϕ () t (3) Fig.1 shows the signal decomposition process of the discrete wavelet transform. We can see from Fig. 1 that the time signal f () t is decomposed for high frequency and low frequency parts. Furthermore, if these parts are to be decompose into the next level, only the low frequency part is divided into the low frequency and high frequency components. And thus Equation (1) can be denoted into: + m/2 m ϕmn, ϕ mn, (4) Gm (, j) = Fab (, ) = f( t) ( tdt ), and ( t) = a ( a t nb) where m represent the decomposition level, j=1 and j=0 respectively stand for the low frequency signal and high frequency signal of the mth decomposition level. Because of the orthogonality of the discrete wavelet function, the interaction of two points caused by redundant signals is eliminated. At the same time, this orthogonality also makes the less errors. Thereby, the time-frequency analysis can be better to reflect the nature of the signal itself. Through the discrete wavelet (2) 104
3 transform showed in Fig.1 and Equation (1), the signal f () t can be transformed into the time-frequency signals of the different scales, namely, [ ] [ ] f ( t) G(1, 0), G(1,1), G(2, 0), G(2,1),... (5) where Gi (,0) and Gi (,1) are the low frequency signal and high frequency signal in the ith decomposition level. Generally, the high frequency parts of the discrete wavelet transform describe the rapid changes of network traffic and the low frequency parts denote the trend of network traffic. However, the abnormal traffic can not only change slowly in the time, but also can vary quickly. To accurately capture these characteristics of network traffic in the different scales, we analyze its low and high frequency characteristics concurrently. To seize the abnormal nature of network traffic, we discuss the variance of the low and high frequency signal in the different scales. And based on sliding window, we propose a variance analysis method to extract the abnormal of network traffic. Assume that the discrete wavelet transform Gi (, j ) (where i = 1,2,... ; j = 0 or 1) is a series with the size k. and then it can be formulated into: Gi (, j) = [ gi (, j,1), gi (, j,2),..., gi (, jk, )] (6) And then the variance of Gi (, j ) at the time t can be described by the statistic variance in the sliding time window with the size h, namely h 1 h 1 t+ t vt () = gi (, jz, ) gt (), and gt () = gi (, jz, ) h 1 k h 1 h 1 z= t z= t 2 2 { } (7) The sliding time window at the time t can be expressed as: h 1 h 1 h: t,..., t,..., t+ 2 2 (8) Equation (7) means that v(t) denotes a time series related with the time t. According to Equation (7), as mentioned in [6], we use the statistic analysis to decide the detection threshold of the series sequence vt () And then we extract the low and high frequency characteristics of network traffic in the different scales. Based on Equation (3), we get a new time series ζ () t by the time reconstruction. Similarly, we determine a detection threshold of ζ () t and identify when abnormal traffic takes place. The below algorithm steps indicate the detailed detecting process of network traffic. Step 1..Give the network traffic f () t and the decomposition threshold β of the discrete wavelet transform, and set the decomposition level i = 1. Step 2. According to Equations (1) and (4), perform discrete wavelet transform for f () t. And obtain low frequency signal series Gi (,0) and high frequency signal series Gi (,1) showed in Equation (5). Step 3. Calculate the statistic variance of sand Gi (,1) by Equation (7), respectively. And then obtain a new time series. Step 4: Discuss the statistic nature of vt () extract the specious abnormal parts of network traffic, and reconstruct it into a new time signal ζ () t. Step 5. Analyze the statistic nature of ζ () t and decide the detection threshold α. Step 6. If ζ () t > α, then diagnose f () t into the abnormal traffic at the time t. Step 7. If the current decomposition does not arrive at the decomposition threshold β, then set f () t = G( i,0) and i = i+ 1, and go back to Step 2. Step 8. Save the detection results to files and exit the detection process. 3. Simulation Result and Analysis To verify the effectiveness of our algorithm, we exploit the real traffic data from the Abilene backbone network and the background traffic without attacks. And we utilize the DDoS tool in the local area network 105
4 to emulate the attack traffic. By injecting the emulated attack traffic into the real background traffic, we synthesize the abnormal network traffic. To validate the performance, we inject the attack traffic in the irregular interval, namely [500,519], [700,719], [1000,1019], [1400,1419]. Fig. 2 plots out the network traffic without attacks and network traffic with attacks. From Fig.2, we can not find the difference between them in these time zones. Hence, it is very difficult to detect anoma- lous components in network traffic only in the time domain. Fig.2 Network traffic without and with attacks. Fig.3 Discrete wavelet decomposition in level 2. Figs. 3 and 4 shows the discrete wavelet decomposition in level 2 and the corresponding time signal reconstructed, respectively. Form Fig. 3(a) and (b), we easily find that although the network traffic signal is decomposed in level 2, its low and high frequency characteristics are not obvious. That is to say, we can not diagnose the anomalous parts of network traffic only by the discrete wavelet transform in level 2. Fig. 3(c) and (d) illustrate the statistic variance of the low and high frequency parts corresponding to Fig. 3(a) and (b), respectively. Moreover, Fig. 3(c) and (d) also indicate that we can recognize exactly the abnormal parts of the low and high frequency traffic signals in level 2. Obviously, this shows that the anomalous nature of network traffic has been exhibited by its scale and time-frequency feature. Fig.4 illustrates the reconstructed time signal by the extracted nature of network traffic corresponding to Fig. 3(c) and (d). From Fig. 4, we can see that the reconstructed signal can embody when the traffic anomalies appear. As a result, we can accurately detect and find the abnormal components of network traffic. More importantly, we can find out all the abnormal parts only in level 2. This shows that our method is effective. Likewise, we continue to decompose the network traffic in level 3 to validate the detection performance of our algorithm. Figs. (5) and (6) show the decomposition in level 3 and the corresponding reconstructed, respectively signal. We find that although all the abnormal properties can not be extracted, all the anomalous parts can still be detected accurately. This further indicate that our algorithm is feasible and promising. 4. Summary This paper presents a new anomaly detection algorithm of network traffic based on time-frequency analysis and statistic theory. The discrete wavelet transform is exploited to capture the time-frequency nature and scale feature of network traffic. And then we can easily decompose it into the low and high frequency signals. By analyzing its statistic properties in the different scales based on the sliding time window, we can easily capture and extract the abnormal nature of network traffic. Consequently, we can accurately detect when the abnormal traffic takes place. Simulation results illuminate that our algorithm is promising. 5. Acknowledgement This work was supported in part by the National Natural Science Foundation of China (Nos , and ), the Fok Ying Tung Education Foundation (No ), the Specialized Research 106
5 Fund for the Doctoral Program of Higher Education (No ), and the Program for New Century Excellent Talents in University (No ) ), the Fundamental Research Funds for the Central Universities (No. N ), the Open Project of State key Laboratory of Networking and Switching Technology (No. SKLNST ), the China Postdoctoral Science Foundation (No ), and the Northeastern University Postdoctoral Science Foundation (No ).The authors wish to thank the reviewers for their helpful comments. Fig.4 Reconstructed time signal from level 2. Fig5 Discrete wavelet decomposition in level 3. Fig.6: Reconstructed time signal from level References [1] A. Lakhina and M. Crovella. Mining anomalies using traffic feature distributions. Computer Communication Review, vol. 35, no. 4, pp , Oct [2] D. Jiang, J. Chen, and L. He. An accurate approach of large-scale IP traffic matrix estimation. IEICE Transactions on Communications, vol. E90-B, no. 12, pp , [3] P. Zuraniewsk and D. Rincon. Wavelet transforms and change-point detection algorithms for tracking network traffic fractality. Proc. of NGIDE'06, 2006, pp [4] L. Guo, J. Cao, H. Yu, and L. Li, Path-based routing provisioning with mixed shared protection in WDM mesh networks, J. Lightwave Technol., 2006, 24: [5] Z. Wang, H. Che, J. Cao, et al. A TCAM-based solution for integrated traffic anomaly detection and policy filtering. Compuer Commucations, vol. 32, pp , Nov [6] D. Jiang, X. Wang, and L.Guo. An optimization method of large-scale IP traffic matrix estimation. AEU- International Journal of Electronics and Communications, vol. 64, no. 7, pp ,
6 [7] L. Guo, LSSP: A novel local segment shared protection for multi-domain optical mesh networks, Computer Commun., 2007, 30: [8] K. Limthong, P. Watanapongse. A wavelet-based anomaly detection for outband network traffic. Proc. of APSITT'10, 2010, pp [9] A. N. Mahmmood, J. Hu, Z. Tari, et al. Critical infrastructure protection: Resource efficient sampling to improve detection of less frequent patterns in network traffic. Journal of Network and Computer Applications, vol. 33, pp , Jul [10] M. Salagean. Real network traffic anomaly detection based on analytical discrete wavelet transform. Proc. of OPTIM'10, 2010, pp [11] R. Anitha. Detecting keyloggers based on traffic analysis with periodic behaviour. Network Security, pp , Jul
Broadband Networks. Prof. Dr. Abhay Karandikar. Electrical Engineering Department. Indian Institute of Technology, Bombay. Lecture - 29.
Broadband Networks Prof. Dr. Abhay Karandikar Electrical Engineering Department Indian Institute of Technology, Bombay Lecture - 29 Voice over IP So, today we will discuss about voice over IP and internet
Detecting Network Anomalies. Anant Shah
Detecting Network Anomalies using Traffic Modeling Anant Shah Anomaly Detection Anomalies are deviations from established behavior In most cases anomalies are indications of problems The science of extracting
Load Balanced Optical-Network-Unit (ONU) Placement Algorithm in Wireless-Optical Broadband Access Networks
Load Balanced Optical-Network-Unit (ONU Placement Algorithm in Wireless-Optical Broadband Access Networks Bing Li, Yejun Liu, and Lei Guo Abstract With the broadband services increasing, such as video
An Anomaly-Based Method for DDoS Attacks Detection using RBF Neural Networks
2011 International Conference on Network and Electronics Engineering IPCSIT vol.11 (2011) (2011) IACSIT Press, Singapore An Anomaly-Based Method for DDoS Attacks Detection using RBF Neural Networks Reyhaneh
A Wavelet Based Prediction Method for Time Series
A Wavelet Based Prediction Method for Time Series Cristina Stolojescu 1,2 Ion Railean 1,3 Sorin Moga 1 Philippe Lenca 1 and Alexandru Isar 2 1 Institut TELECOM; TELECOM Bretagne, UMR CNRS 3192 Lab-STICC;
A Digital Audio Watermark Embedding Algorithm
Xianghong Tang, Yamei Niu, Hengli Yue, Zhongke Yin Xianghong Tang, Yamei Niu, Hengli Yue, Zhongke Yin School of Communication Engineering, Hangzhou Dianzi University, Hangzhou, Zhejiang, 3008, China [email protected],
packet retransmitting based on dynamic route table technology, as shown in fig. 2 and 3.
Implementation of an Emulation Environment for Large Scale Network Security Experiments Cui Yimin, Liu Li, Jin Qi, Kuang Xiaohui National Key Laboratory of Science and Technology on Information System
A Frequency-Based Approach to Intrusion Detection
A Frequency-Based Approach to Intrusion Detection Mian Zhou and Sheau-Dong Lang School of Electrical Engineering & Computer Science and National Center for Forensic Science, University of Central Florida,
A Novel Distributed Denial of Service (DDoS) Attacks Discriminating Detection in Flash Crowds
International Journal of Research Studies in Science, Engineering and Technology Volume 1, Issue 9, December 2014, PP 139-143 ISSN 2349-4751 (Print) & ISSN 2349-476X (Online) A Novel Distributed Denial
Bandwidth analysis of multimode fiber passive optical networks (PONs)
Optica Applicata, Vol. XXXIX, No. 2, 2009 Bandwidth analysis of multimode fiber passive optical networks (PONs) GRZEGORZ STEPNIAK *, LUKASZ MAKSYMIUK, JERZY SIUZDAK Institute of Telecommunications, Warsaw
BEHAVIOR BASED CREDIT CARD FRAUD DETECTION USING SUPPORT VECTOR MACHINES
BEHAVIOR BASED CREDIT CARD FRAUD DETECTION USING SUPPORT VECTOR MACHINES 123 CHAPTER 7 BEHAVIOR BASED CREDIT CARD FRAUD DETECTION USING SUPPORT VECTOR MACHINES 7.1 Introduction Even though using SVM presents
Orchestration and detection of stealthy DoS/DDoS Attacks
Orchestration and detection of stealthy DoS/DDoS Attacks Mohammedshahzan A Mulla 1, Asst prof Shivraj V B 2 Mtech - Dept. of CSE CMRIT Bangalore. Abstract The accomplishment of the cloud computing model
Multi-Channel DDOS Attack Detection & Prevention for Effective Resource Sharing in Cloud
Multi-Channel DDOS Attack Detection & Prevention for Effective Resource Sharing in Cloud 1 J. JANCYRANI, 2 B. NITHIA 1 PG scholar, Department Of Computer Science and Engineering, Surya school of engineering
AN EFFICIENT DISTRIBUTED CONTROL LAW FOR LOAD BALANCING IN CONTENT DELIVERY NETWORKS
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 9, September 2014,
Data Cleansing for Remote Battery System Monitoring
Data Cleansing for Remote Battery System Monitoring Gregory W. Ratcliff Randall Wald Taghi M. Khoshgoftaar Director, Life Cycle Management Senior Research Associate Director, Data Mining and Emerson Network
A Regime-Switching Model for Electricity Spot Prices. Gero Schindlmayr EnBW Trading GmbH [email protected]
A Regime-Switching Model for Electricity Spot Prices Gero Schindlmayr EnBW Trading GmbH [email protected] May 31, 25 A Regime-Switching Model for Electricity Spot Prices Abstract Electricity markets
Tracking Moving Objects In Video Sequences Yiwei Wang, Robert E. Van Dyck, and John F. Doherty Department of Electrical Engineering The Pennsylvania State University University Park, PA16802 Abstract{Object
Adaptive Discriminating Detection for DDoS Attacks from Flash Crowds Using Flow. Feedback
Adaptive Discriminating Detection for DDoS Attacks from Flash Crowds Using Flow Correlation Coeff icient with Collective Feedback N.V.Poorrnima 1, K.ChandraPrabha 2, B.G.Geetha 3 Department of Computer
Impact of Feature Selection on the Performance of Wireless Intrusion Detection Systems
2009 International Conference on Computer Engineering and Applications IPCSIT vol.2 (2011) (2011) IACSIT Press, Singapore Impact of Feature Selection on the Performance of ireless Intrusion Detection Systems
Dual Mechanism to Detect DDOS Attack Priyanka Dembla, Chander Diwaker 2 1 Research Scholar, 2 Assistant Professor
International Association of Scientific Innovation and Research (IASIR) (An Association Unifying the Sciences, Engineering, and Applied Research) International Journal of Engineering, Business and Enterprise
Mining Anomalies in Network-Wide Flow Data. Anukool Lakhina, Ph.D. with Mark Crovella and Christophe Diot
Mining Anomalies in Network-Wide Flow Data Anukool Lakhina, Ph.D. with Mark Crovella and Christophe Diot SANOG-7, Mumbai, January, 00 Network Anomaly Diagnosis Am I being attacked? Is someone scanning
A HYBRID RULE BASED FUZZY-NEURAL EXPERT SYSTEM FOR PASSIVE NETWORK MONITORING
A HYBRID RULE BASED FUZZY-NEURAL EXPERT SYSTEM FOR PASSIVE NETWORK MONITORING AZRUDDIN AHMAD, GOBITHASAN RUDRUSAMY, RAHMAT BUDIARTO, AZMAN SAMSUDIN, SURESRAWAN RAMADASS. Network Research Group School of
Detection and mitigation of Web Services Attacks using Markov Model
Detection and mitigation of Web Services Attacks using Markov Model Vivek Relan [email protected] Bhushan Sonawane [email protected] Department of Computer Science and Engineering, University of Maryland,
Dynamic Congestion-Based Load Balanced Routing in Optical Burst-Switched Networks
Dynamic Congestion-Based Load Balanced Routing in Optical Burst-Switched Networks Guru P.V. Thodime, Vinod M. Vokkarane, and Jason P. Jue The University of Texas at Dallas, Richardson, TX 75083-0688 vgt015000,
Drop Call Probability in Established Cellular Networks: from data Analysis to Modelling
Drop Call Probability in Established Cellular Networks: from data Analysis to Modelling G. Boggia, P. Camarda, A. D Alconzo, A. De Biasi and M. Siviero DEE - Politecnico di Bari, Via E. Orabona, 4-7125
Algorithms for Interference Sensing in Optical CDMA Networks
Algorithms for Interference Sensing in Optical CDMA Networks Purushotham Kamath, Joseph D. Touch and Joseph A. Bannister {pkamath, touch, joseph}@isi.edu Information Sciences Institute, University of Southern
The Combination Forecasting Model of Auto Sales Based on Seasonal Index and RBF Neural Network
, pp.67-76 http://dx.doi.org/10.14257/ijdta.2016.9.1.06 The Combination Forecasting Model of Auto Sales Based on Seasonal Index and RBF Neural Network Lihua Yang and Baolin Li* School of Economics and
Botnet Detection Based on Degree Distributions of Node Using Data Mining Scheme
Botnet Detection Based on Degree Distributions of Node Using Data Mining Scheme Chunyong Yin 1,2, Yang Lei 1, Jin Wang 1 1 School of Computer & Software, Nanjing University of Information Science &Technology,
A Systemfor Scanning Traffic Detection in 3G WCDMA Network
2012 IACSIT Hong Kong Conferences IPCSIT vol. 30 (2012) (2012) IACSIT Press, Singapore A Systemfor Scanning Traffic Detection in 3G WCDMA Network Sekwon Kim +, Joohyung Oh and Chaetae Im Advanced Technology
A Hybrid Electrical and Optical Networking Topology of Data Center for Big Data Network
ASEE 2014 Zone I Conference, April 3-5, 2014, University of Bridgeport, Bridgpeort, CT, USA A Hybrid Electrical and Optical Networking Topology of Data Center for Big Data Network Mohammad Naimur Rahman
How To Balance A Web Server With Remaining Capacity
Remaining Capacity Based Load Balancing Architecture for Heterogeneous Web Server System Tsang-Long Pao Dept. Computer Science and Engineering Tatung University Taipei, ROC Jian-Bo Chen Dept. Computer
Adaptive Probing: A Monitoring-Based Probing Approach for Fault Localization in Networks
Adaptive Probing: A Monitoring-Based Probing Approach for Fault Localization in Networks Akshay Kumar *, R. K. Ghosh, Maitreya Natu *Student author Indian Institute of Technology, Kanpur, India Tata Research
Application of Netflow logs in Analysis and Detection of DDoS Attacks
International Journal of Computer and Internet Security. ISSN 0974-2247 Volume 8, Number 1 (2016), pp. 1-8 International Research Publication House http://www.irphouse.com Application of Netflow logs in
Traffic Prediction in Wireless Mesh Networks Using Process Mining Algorithms
Traffic Prediction in Wireless Mesh Networks Using Process Mining Algorithms Kirill Krinkin Open Source and Linux lab Saint Petersburg, Russia [email protected] Eugene Kalishenko Saint Petersburg
Semantic Video Annotation by Mining Association Patterns from Visual and Speech Features
Semantic Video Annotation by Mining Association Patterns from and Speech Features Vincent. S. Tseng, Ja-Hwung Su, Jhih-Hong Huang and Chih-Jen Chen Department of Computer Science and Information Engineering
This document is downloaded from DR-NTU, Nanyang Technological University Library, Singapore.
This document is downloaded from DR-NTU, Nanyang Technological University Library, Singapore. Title Transcription of polyphonic signals using fast filter bank( Accepted version ) Author(s) Foo, Say Wei;
DDOS WALL: AN INTERNET SERVICE PROVIDER PROTECTOR
Journal homepage: www.mjret.in DDOS WALL: AN INTERNET SERVICE PROVIDER PROTECTOR Maharudra V. Phalke, Atul D. Khude,Ganesh T. Bodkhe, Sudam A. Chole Information Technology, PVPIT Bhavdhan Pune,India [email protected],
Detecting Multiple Selfish Attack Nodes Using Replica Allocation in Cognitive Radio Ad-Hoc Networks
Detecting Multiple Selfish Attack Nodes Using Replica Allocation in Cognitive Radio Ad-Hoc Networks Kiruthiga S PG student, Coimbatore Institute of Engineering and Technology Anna University, Chennai,
A SYSTEM FOR DENIAL OF SERVICE ATTACK DETECTION BASED ON MULTIVARIATE CORRELATION ANALYSIS
Journal homepage: www.mjret.in ISSN:2348-6953 A SYSTEM FOR DENIAL OF SERVICE ATTACK DETECTION BASED ON MULTIVARIATE CORRELATION ANALYSIS P.V.Sawant 1, M.P.Sable 2, P.V.Kore 3, S.R.Bhosale 4 Department
Entropy-Based Collaborative Detection of DDoS Attacks on Community Networks
Entropy-Based Collaborative Detection of DDoS Attacks on Community Networks Krishnamoorthy.D 1, Dr.S.Thirunirai Senthil, Ph.D 2 1 PG student of M.Tech Computer Science and Engineering, PRIST University,
Active Internet Traffic Filtering to Denial of Service Attacks from Flash Crowds
Active Internet Traffic Filtering to Denial of Service Attacks from Flash Crowds S.Saranya Devi 1, K.Kanimozhi 2 1 Assistant professor, Department of Computer Science and Engineering, Vivekanandha Institute
Efficient Data Recovery scheme in PTS-Based OFDM systems with MATRIX Formulation
Efficient Data Recovery scheme in PTS-Based OFDM systems with MATRIX Formulation Sunil Karthick.M PG Scholar Department of ECE Kongu Engineering College Perundurau-638052 Venkatachalam.S Assistant Professor
Incorporating Internal Gradient and Restricted Diffusion Effects in Nuclear Magnetic Resonance Log Interpretation
The Open-Access Journal for the Basic Principles of Diffusion Theory, Experiment and Application Incorporating Internal Gradient and Restricted Diffusion Effects in Nuclear Magnetic Resonance Log Interpretation
Using Data Mining for Mobile Communication Clustering and Characterization
Using Data Mining for Mobile Communication Clustering and Characterization A. Bascacov *, C. Cernazanu ** and M. Marcu ** * Lasting Software, Timisoara, Romania ** Politehnica University of Timisoara/Computer
Automatic Mining of Internet Translation Reference Knowledge Based on Multiple Search Engines
, 22-24 October, 2014, San Francisco, USA Automatic Mining of Internet Translation Reference Knowledge Based on Multiple Search Engines Baosheng Yin, Wei Wang, Ruixue Lu, Yang Yang Abstract With the increasing
Wavelet analysis. Wavelet requirements. Example signals. Stationary signal 2 Hz + 10 Hz + 20Hz. Zero mean, oscillatory (wave) Fast decay (let)
Wavelet analysis In the case of Fourier series, the orthonormal basis is generated by integral dilation of a single function e jx Every 2π-periodic square-integrable function is generated by a superposition
Research on the UHF RFID Channel Coding Technology based on Simulink
Vol. 6, No. 7, 015 Research on the UHF RFID Channel Coding Technology based on Simulink Changzhi Wang Shanghai 0160, China Zhicai Shi* Shanghai 0160, China Dai Jian Shanghai 0160, China Li Meng Shanghai
A COGNITIVE NETWORK BASED ADAPTIVE LOAD BALANCING ALGORITHM FOR EMERGING TECHNOLOGY APPLICATIONS *
International Journal of Computer Science and Applications, Technomathematics Research Foundation Vol. 13, No. 1, pp. 31 41, 2016 A COGNITIVE NETWORK BASED ADAPTIVE LOAD BALANCING ALGORITHM FOR EMERGING
Detecting Constant Low-Frequency Appilication Layer Ddos Attacks Using Collaborative Algorithms B. Aravind, (M.Tech) CSE Dept, CMRTC, Hyderabad
Detecting Constant Low-Frequency Appilication Layer Ddos Attacks Using Collaborative Algorithms B. Aravind, (M.Tech) CSE Dept, CMRTC, Hyderabad M. Lakshmi Narayana, M.Tech CSE Dept, CMRTC, Hyderabad Abstract:
A TWO LEVEL ARCHITECTURE USING CONSENSUS METHOD FOR GLOBAL DECISION MAKING AGAINST DDoS ATTACKS
ICTACT JOURNAL ON COMMUNICATION TECHNOLOGY, JUNE 2010, ISSUE: 02 A TWO LEVEL ARCHITECTURE USING CONSENSUS METHOD FOR GLOBAL DECISION MAKING AGAINST DDoS ATTACKS S.Seetha 1 and P.Raviraj 2 Department of
How To Detect Denial Of Service Attack On A Network With A Network Traffic Characterization Scheme
Efficient Detection for DOS Attacks by Multivariate Correlation Analysis and Trace Back Method for Prevention Thivya. T 1, Karthika.M 2 Student, Department of computer science and engineering, Dhanalakshmi
A Novel Pathway for Portability of Networks and Handing-on between Networks
A Novel Pathway for Portability of Networks and Handing-on between Networks D. S. Dayana #1, S. R. Surya #2 Department of Computer Applications, SRM University, Chennai, India 1 [email protected]
Virtual Network Topology Control with Oja and APEX Learning
Virtual Network Topology Control with Oja and Learning Y. Sinan Hanay, Yuki Koizumi, Shin ichi Arakawa and Masayuki Murata Graduate School of Information Sciences and Technology Osaka University Suita,
International Journal of Advanced Research in Computer Science and Software Engineering
Volume 2, Issue 9, September 2012 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com An Experimental
IP NETWORK MONITORING AND AUTOMATIC ANOMALY DETECTION
IP NETWORK MONITORING AND AUTOMATIC ANOMALY DETECTION Michael de Castro, DEEC, Instituto Superior Técnico, Lisboa, Portugal November 2008 Abstract. This paper presents a new tool designed to assist in
Firewall Policy Anomalies- Detection and Resolution
Firewall Policy Anomalies- Detection and Resolution Jitha C K #1, Sreekesh Namboodiri *2 #1 MTech student(cse),mes College of Engineering,Kuttippuram,India #2 Assistant Professor(CSE),MES College of Engineering,Kuttippuram,India
Application of Data Mining Techniques in Intrusion Detection
Application of Data Mining Techniques in Intrusion Detection LI Min An Yang Institute of Technology [email protected] Abstract: The article introduced the importance of intrusion detection, as well as
A RFID Data-Cleaning Algorithm Based on Communication Information among RFID Readers
, pp.155-164 http://dx.doi.org/10.14257/ijunesst.2015.8.1.14 A RFID Data-Cleaning Algorithm Based on Communication Information among RFID Readers Yunhua Gu, Bao Gao, Jin Wang, Mingshu Yin and Junyong Zhang
Efficient Detection of Ddos Attacks by Entropy Variation
IOSR Journal of Computer Engineering (IOSRJCE) ISSN: 2278-0661, ISBN: 2278-8727 Volume 7, Issue 1 (Nov-Dec. 2012), PP 13-18 Efficient Detection of Ddos Attacks by Entropy Variation 1 V.Sus hma R eddy,
Detection of changes in variance using binary segmentation and optimal partitioning
Detection of changes in variance using binary segmentation and optimal partitioning Christian Rohrbeck Abstract This work explores the performance of binary segmentation and optimal partitioning in the
Social Innovation through Utilization of Big Data
Social Innovation through Utilization of Big Data Hitachi Review Vol. 62 (2013), No. 7 384 Shuntaro Hitomi Keiro Muro OVERVIEW: The analysis and utilization of large amounts of actual operational data
Self-Compressive Approach for Distributed System Monitoring
Self-Compressive Approach for Distributed System Monitoring Akshada T Bhondave Dr D.Y Patil COE Computer Department, Pune University, India Santoshkumar Biradar Assistant Prof. Dr D.Y Patil COE, Computer
Research on the Course of Network Performance Testing and Analysis
2012 International Conference on Education Technology and Computer (ICETC2012) IPCSIT vol.43 (2012) (2012) IACSIT Press, Singapore Research on the Course of Network Performance Testing and Analysis Xiurong
Fault-Tolerant Framework for Load Balancing System
Fault-Tolerant Framework for Load Balancing System Y. K. LIU, L.M. CHENG, L.L.CHENG Department of Electronic Engineering City University of Hong Kong Tat Chee Avenue, Kowloon, Hong Kong SAR HONG KONG Abstract:
Fault Analysis in Software with the Data Interaction of Classes
, pp.189-196 http://dx.doi.org/10.14257/ijsia.2015.9.9.17 Fault Analysis in Software with the Data Interaction of Classes Yan Xiaobo 1 and Wang Yichen 2 1 Science & Technology on Reliability & Environmental
An Efficient Way of Denial of Service Attack Detection Based on Triangle Map Generation
An Efficient Way of Denial of Service Attack Detection Based on Triangle Map Generation Shanofer. S Master of Engineering, Department of Computer Science and Engineering, Veerammal Engineering College,
A Secure Online Reputation Defense System from Unfair Ratings using Anomaly Detections
A Secure Online Reputation Defense System from Unfair Ratings using Anomaly Detections Asha baby PG Scholar,Department of CSE A. Kumaresan Professor, Department of CSE K. Vijayakumar Professor, Department
Report on the Train Ticketing System
Report on the Train Ticketing System Author: Zaobo He, Bing Jiang, Zhuojun Duan 1.Introduction... 2 1.1 Intentions... 2 1.2 Background... 2 2. Overview of the Tasks... 3 2.1 Modules of the system... 3
Prediction of DDoS Attack Scheme
Chapter 5 Prediction of DDoS Attack Scheme Distributed denial of service attack can be launched by malicious nodes participating in the attack, exploit the lack of entry point in a wireless network, and
HSI BASED COLOUR IMAGE EQUALIZATION USING ITERATIVE n th ROOT AND n th POWER
HSI BASED COLOUR IMAGE EQUALIZATION USING ITERATIVE n th ROOT AND n th POWER Gholamreza Anbarjafari icv Group, IMS Lab, Institute of Technology, University of Tartu, Tartu 50411, Estonia [email protected]
APPLICATION OF MULTI-AGENT SYSTEMS FOR NETWORK AND INFORMATION PROTECTION
18-19 September 2014, BULGARIA 137 Proceedings of the International Conference on Information Technologies (InfoTech-2014) 18-19 September 2014, Bulgaria APPLICATION OF MULTI-AGENT SYSTEMS FOR NETWORK
Using UDP Packets to Detect P2P File Sharing
188 IJCSNS International Journal of Computer Science and Network Security, VOL.7 No.8, August 27 Using UDP Packets to Detect P2P File Sharing Tsang-Long Pao and Jian-Bo Chen Tatung University, Taipei,
ACL Based Dynamic Network Reachability in Cross Domain
South Asian Journal of Engineering and Technology Vol.2, No.15 (2016) 68 72 ISSN No: 2454-9614 ACL Based Dynamic Network Reachability in Cross Domain P. Nandhini a, K. Sankar a* a) Department Of Computer
CAPTCHA-based DDoS Defense System of Call Centers against Zombie Smart-Phone
CAPTCHA-based DDoS Defense System of Call Centers against Zombie Smart-Phone Seung Wook Jung Soongsil University [email protected] Abstract Recently, some researchers alarm the security community that
Flexible mobility management strategy in cellular networks
Flexible mobility management strategy in cellular networks JAN GAJDORUS Department of informatics and telecommunications (161114) Czech technical university in Prague, Faculty of transportation sciences
THE Walsh Hadamard transform (WHT) and discrete
IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS I: REGULAR PAPERS, VOL. 54, NO. 12, DECEMBER 2007 2741 Fast Block Center Weighted Hadamard Transform Moon Ho Lee, Senior Member, IEEE, Xiao-Dong Zhang Abstract
Network traffic: Scaling
Network traffic: Scaling 1 Ways of representing a time series Timeseries Timeseries: information in time domain 2 Ways of representing a time series Timeseries FFT Timeseries: information in time domain
DC/DC BUCK Converter for Renewable Energy Applications Mr.C..Rajeshkumar M.E Power Electronic and Drives,
DC/DC BUCK Converter for Renewable Energy Applications Mr.C..Rajeshkumar M.E Power Electronic and Drives, Mr.C.Anandaraj Assistant Professor -EEE Thiruvalluvar college of Engineering And technology, Ponnur
Keywords Attack model, DDoS, Host Scan, Port Scan
Volume 4, Issue 6, June 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com DDOS Detection
AUTONOMOUS NETWORK SECURITY FOR DETECTION OF NETWORK ATTACKS
AUTONOMOUS NETWORK SECURITY FOR DETECTION OF NETWORK ATTACKS Nita V. Jaiswal* Prof. D. M. Dakhne** Abstract: Current network monitoring systems rely strongly on signature-based and supervised-learning-based
Combining Statistical and Spectral Analysis Techniques in Network Traffic Anomaly Detection
Combining Statistical and Spectral Analysis Techniques in Network Traffic Anomaly Detection by Stevan Novakov, B. Eng. (CSE) A thesis submitted to the Faculty of Graduate and Postdoctoral Affairs in partial
Bandwidth Allocation DBA (BA-DBA) Algorithm for xpon Networks
Bandwidth Allocation DBA (BA-DBA) Algorithm for xpon Networks Karamitsos Ioannis Telecom Lab,On Telecoms Athens, Attica 16342, Greece Al-Arfaj Khalid Rayadah Investment Co Riyadh, KSA Kingdom of Saudi
DETECTING AND PREVENTING THE PACKET FOR TRACE BACK DDOS ATTACK IN MOBILE AD-HOC NETWORK
DETECTING AND PREVENTING THE PACKET FOR TRACE BACK DDOS ATTACK IN MOBILE AD-HOC NETWORK M.Yasodha 1, S.Umarani 2, D.Sharmila 3 1 PG Scholar, Maharaja Engineering College, Avinashi, India. 2 Assistant Professor,
Detection of Collusion Behaviors in Online Reputation Systems
Detection of Collusion Behaviors in Online Reputation Systems Yuhong Liu, Yafei Yang, and Yan Lindsay Sun University of Rhode Island, Kingston, RI Email: {yuhong, yansun}@ele.uri.edu Qualcomm Incorporated,
A Survey on Outlier Detection Techniques for Credit Card Fraud Detection
IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661, p- ISSN: 2278-8727Volume 16, Issue 2, Ver. VI (Mar-Apr. 2014), PP 44-48 A Survey on Outlier Detection Techniques for Credit Card Fraud
An Immune System Based Genetic Algorithm Using Permutation-Based Dualism for Dynamic Traveling Salesman Problems
An Immune System Based Genetic Algorithm Using Permutation-Based Dualism for Dynamic Traveling Salesman Problems Lili Liu 1, Dingwei Wang 1, and Shengxiang Yang 2 1 School of Information Science and Engineering,
