2014
DOI: 10.1007/s10922-014-9335-3
|View full text |Cite
|
Sign up to set email alerts
|

Designing an Internet Traffic Predictive Model by Applying a Signal Processing Method

Abstract: Detection of abnormal internet traffic has become a significant area of research in network security. Due to its importance, many predictive models are designed by utilizing machine learning algorithms. The models are well designed to show high performances in detecting abnormal internet traffic behaviors. However, they may not guarantee reliable detection performances for new incoming abnormal internet traffic because they are designed using raw features from imbalanced internet traffic data. Since internet t… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
6
0

Year Published

2016
2016
2022
2022

Publication Types

Select...
3
2
1

Relationship

1
5

Authors

Journals

citations
Cited by 8 publications
(6 citation statements)
references
References 45 publications
0
6
0
Order By: Relevance
“…Moreover, the lack of incremental clustering ability is considered as a possible research challenge [57]. Therefore, feature extraction or reduction algorithms often have to be performed, which could provide considerable overhead and slower response to newer, more sophisticated attacks [66].…”
Section: Discussionmentioning
confidence: 99%
“…Moreover, the lack of incremental clustering ability is considered as a possible research challenge [57]. Therefore, feature extraction or reduction algorithms often have to be performed, which could provide considerable overhead and slower response to newer, more sophisticated attacks [66].…”
Section: Discussionmentioning
confidence: 99%
“…Performance use cases (1)(2) capture the RTT of packets in benign traffic over a normal link and a congested link, respectively. The security use cases (3)(4)(5) consist of different attacks that generate malicious traffic such as Heartbleed and Cobalt strike. We analyze each use case's traffic separately.…”
Section: B Applicabilitymentioning
confidence: 99%
“…behavior [3], [10], reconstructing the signal of a network communication [11], and analyzing the energy spectrum [12]. However, traditional signal processing techniques such as the Discrete Fourier Transform (DFT) are known to have a high computational overhead that prevents them from being used for real-time periodicity detection in high throughput scenarios [2], [10].…”
Section: Introductionmentioning
confidence: 99%
See 2 more Smart Citations