2017
DOI: 10.48550/arxiv.1710.06121
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

Internet Anomaly Detection based on Complex Network Path

Abstract: Detecting the anomaly behaviors such as network failure or Internet intentional attack in the large-scale Internet is a vital but challenging task. While numerous techniques have been developed based on Internet traffic in past years, anomaly detection for structured datasets by complex network have just been of focus recently. In this paper, a anomaly detection method for large-scale Internet topology is proposed by considering the changes of network crashes. In order to quantify the dynamic changes of Intern… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
3
0

Year Published

2018
2018
2019
2019

Publication Types

Select...
2

Relationship

2
0

Authors

Journals

citations
Cited by 2 publications
(3 citation statements)
references
References 26 publications
0
3
0
Order By: Relevance
“…Path Length: The network path length exhibits the effectiveness of information transmission in a network. Recently, researchers have defined multiple metrics about the path length quantify problem [28]. For instance, the shortest path length (SPL) is defined as the average number of steps along the shortest paths for all possible pairs of network nodes, and the network diameter is used to represent the maximum number of steps along the shortest paths.…”
Section: Statistical Characteristics Of Tlcnsmentioning
confidence: 99%
“…Path Length: The network path length exhibits the effectiveness of information transmission in a network. Recently, researchers have defined multiple metrics about the path length quantify problem [28]. For instance, the shortest path length (SPL) is defined as the average number of steps along the shortest paths for all possible pairs of network nodes, and the network diameter is used to represent the maximum number of steps along the shortest paths.…”
Section: Statistical Characteristics Of Tlcnsmentioning
confidence: 99%
“…The network diameter denotes the worst communication path length. Under the intentional attack, network diameter will first increases and then decreases quickly [26]. In this section, we put forward the intuitionistic fuzzification method for single complex network characteristic.…”
mentioning
confidence: 99%
“…In this Letter, the intuitionistic fuzzy set (IFS) [21] is adopted to depict the above uncertain problem. Its key idea is that similar networks probably share certain characteristics, for instance the anomaly detection studies based on a single network characteristic such as node closeness, [22] node betweenness, [23] node degree, [24] local clustering coefficient, [25] network diameter, [26] network entropy, [27] and network assortativity. Different from Ref.…”
mentioning
confidence: 99%