2011 IEEE International Conference on Communications (ICC) 2011
DOI: 10.1109/icc.2011.5962651
|View full text |Cite
|
Sign up to set email alerts
|

Detection of Illicit Network Activities Based on Multivariate Gaussian Fitting of Multi-Scale Traffic Characteristics

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2012
2012
2023
2023

Publication Types

Select...
3
3

Relationship

0
6

Authors

Journals

citations
Cited by 13 publications
(2 citation statements)
references
References 14 publications
0
2
0
Order By: Relevance
“…The statistical methods collect payload-independent variables i.e port numbers, packet length, flow start/stop timestamp and interarrival time of packets in a stream to analyze the network traffic and predict which application or protocol the traffic may belong to [5,101]. In many studies, Machine Learning (ML) algorithms are used [102][103][104] besides statistical methods [105][106][107] to classify network traffic. The studies numbered [103] and [104] use TLS header information and DNS data as well as flow metadata in the analysis of network traffic.…”
Section: Machine Learning Based Techniquementioning
confidence: 99%
“…The statistical methods collect payload-independent variables i.e port numbers, packet length, flow start/stop timestamp and interarrival time of packets in a stream to analyze the network traffic and predict which application or protocol the traffic may belong to [5,101]. In many studies, Machine Learning (ML) algorithms are used [102][103][104] besides statistical methods [105][106][107] to classify network traffic. The studies numbered [103] and [104] use TLS header information and DNS data as well as flow metadata in the analysis of network traffic.…”
Section: Machine Learning Based Techniquementioning
confidence: 99%
“…Another approach is the multivariate Gaussian analysis in which data are flagged as abnormal when they lie a number of standard deviations away from the mean. For instance, in [210], the authors used multivariate Gaussian analysis to detect Internet attacks and intrusions via analyzing the statistical properties of the IP traffic captured. In clustering methods such as k-means clustering, data points can be grouped into clusters based on their distance to the center of the cluster.…”
Section: B Security In Big Data Analyticsmentioning
confidence: 99%