Applying Catastrophe Theory for Network Anomaly Detection in Cloud Computing Traffic
نویسندگان
چکیده
منابع مشابه
Assessment Methodology for Anomaly-Based Intrusion Detection in Cloud Computing
Cloud computing has become an attractive target for attackers as the mainstream technologies in the cloud, such as the virtualization and multitenancy, permit multiple users to utilize the same physical resource, thereby posing the so-called problem of internal facing security. Moreover, the traditional network-based intrusion detection systems (IDSs) are ineffective to be deployed in the cloud...
متن کاملNetwork Traffic Anomaly Detection
This paper presents a tutorial for network anomaly detection, focusing on non-signature-based approaches. Network traffic anomalies are unusual and significant changes in the traffic of a network. Networks play an important role in today’s social and economic infrastructures. The security of the network becomes crucial, and network traffic anomaly detection constitutes an important part of netw...
متن کاملNetwork Traffic Decomposition for Anomaly Detection
In this paper we focus on the detection of network anomalies like Denial of Service (DoS) attacks and port scans in a unified manner. While there has been an extensive amount of research in network anomaly detection, current state of the art methods are only able to detect one class of anomalies at the cost of others. The key tool we will use is based on the spectral decomposition of a trajecto...
متن کاملHardware Supports for Network Traffic Anomaly Detection
Modern network systems are plagued with unknown attacks every time. To detect these attacks, network security systems monitor the anomalous status of network traffics. Most of researches have focused on the software-based anomaly detection and, thus, they have suffered from huge performance declines in high speed and bandwidth networks over one giga bps on one side. Due to the potential perform...
متن کاملIncreasing Reliability in Network Traffic Anomaly Detection
Network traffic anomalies stand for a large fraction of the Internet traffic and compromise the performance of the network resources. Detecting and diagnosing these threats is a laborious and time consuming task that network operators face daily. During the last decade researchers have concentrated their efforts on this problem and proposed several tools to automate this task. Thereby, recent a...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Security and Communication Networks
سال: 2019
ISSN: 1939-0114,1939-0122
DOI: 10.1155/2019/5306395