An approach to detecting anomalies in a self-similar network traffic

نویسندگان

چکیده

Aim. The effects of cyber attacks cause failures network elements, theft information and other unlawful actions. Cyber are often accompanied by untypical traffic activity anomalies. paper aims to develop an approach detecting anomalies in identifying the degree self-similarity using fractal analysis statistical methods. Methods. uses methods mathematical statistics, analysis, analysis. Results. suggests evaluating for improving accuracy attack detection. At first stage, Hurst exponent is calculated reference traffic. second actual divided into optimal time intervals; each interval, calculated. If identified value differs from one obtained traffic, it decided that there anomaly. final used order precisely localise authors analysed resulted identification more efficient be as part proposed approach. For DFA method was proposed, while ARFIMA proposed. Conclusion. suggested allows real or near-real time.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Self-Similar Network Traffic: An Overview

Since the seminal study of Leland, Taqqu, Willinger and Wilson [41] which set the groundwork for considering self-similarity an important notion in the understanding of network traffic including the modeling and analysis of network performance, an explosion of work has ensued investigating the multifaceted nature of this phenomenon.1 The long held paradigm in the communication and performance c...

متن کامل

An Approach to Detect Traffic Anomalies

Sílvia Farraposo, Philippe Owezarski and Edmundo Monteiro School of Technology and Management – Polytechnic Institute of Leiria, Morro do Lena – Alto do Vieiro, 2411-901 Leiria, Apartado4163 – Portugal E-Mail : [email protected] LAAS CNRS, 7 Avenue du Colonel Roche,31077 Toulouse, Cedex 4 – France E-Mail: [email protected] University of Coimbra, Departamento de Engenharia Informática, Pólo II –...

متن کامل

Modeling Self-Similar Traffic for Network Simulation

In order to closely simulate the real network scenario thereby verify the effectiveness of protocol designs, it is necessary to model the traffic flows carried over realistic networks. Extensive studies [1] showed that the actual traffic in access and local area networks (e.g., those generated by ftp and video streams) exhibits the property of self-similarity and long-range dependency (LRD) [2]...

متن کامل

Fast Approximation of Self-Similar Network Traffic

Recent network traffic studies argue that network arrival processes are much more faithfully modeled using statistically self-similarprocesses instead of traditional Poisson processes [LTWW94a, PF94]. One difficulty in dealing with selfsimilar models is how to efficiently synthesize traces (sample paths) corresponding to self-similar traffic. We present a fast Fourier transform method for synth...

متن کامل

Self-Similar Traffic and Network Dynamics

One of the most significant findings of traffic measurement studies over the last decade has been the observed self-similarity in packet network traffic. Subsequent research has focused on the origins of this self-similarity, and the network engineering significance of this phenomenon. This paper reviews what is currently known about network traffic self-similarity and its significance. We then...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: ??????????

سال: 2023

ISSN: ['2765-5768', '2508-2809']

DOI: https://doi.org/10.21683/1729-2646-2023-23-2-57-63