2020 IEEE Symposium on Computers and Communications (ISCC) 2020
DOI: 10.1109/iscc50000.2020.9219645
|View full text |Cite
|
Sign up to set email alerts
|

Finding Persistent Elements of Anomalous Flows in Distributed Monitoring Systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
5
0

Year Published

2023
2023
2023
2023

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(5 citation statements)
references
References 15 publications
0
5
0
Order By: Relevance
“…If the ratio of the value of the counter B[i][j] to the value of the counter B[i][0] is larger than the threshold α, the value of the counter B(j) is the value of the counter B[i][j]. Otherwise, the value of the counter B(j) is the value of the counter B[i][0] subtracted by the value of the counter B[i][j] (lines [3][4][5][6][7][8][9][10][11]. If the estimated value is more than the threshold θ 1 L, the candidates are considered to be abnormal flows with high traffic volume (lines [12][13][14][15].…”
Section: Detecting Abnormal Flows With High Traffic Volume or Signifi...mentioning
confidence: 99%
See 3 more Smart Citations
“…If the ratio of the value of the counter B[i][j] to the value of the counter B[i][0] is larger than the threshold α, the value of the counter B(j) is the value of the counter B[i][j]. Otherwise, the value of the counter B(j) is the value of the counter B[i][0] subtracted by the value of the counter B[i][j] (lines [3][4][5][6][7][8][9][10][11]. If the estimated value is more than the threshold θ 1 L, the candidates are considered to be abnormal flows with high traffic volume (lines [12][13][14][15].…”
Section: Detecting Abnormal Flows With High Traffic Volume or Signifi...mentioning
confidence: 99%
“…This paper focuses on the problem of finding abnormal flows in the distributed monitoring system consisting of the controller and multiple monitors. 3 For a flow, its traffic volume denotes the number of packets or bytes occurring in one measurement period. Therefore, the problem of detecting abnormal flows is converted to find flows with high traffic volume in one measurement period or significant change in traffic volume between two consecutive measurement periods.…”
Section: Introductionmentioning
confidence: 99%
See 2 more Smart Citations
“…We build upon the notion of t-persistence [23] and we call nonstationary and stationary devices the devices whose probe requests reach a certain scanner in less than t, respectively at least t out of a total of c e epochs (i.e. predefined fixed-length time intervals) preceding the concerned moment of counting.…”
Section: Anonymized Counting Of Nonstationary Wi-fi Devicesmentioning
confidence: 99%