2007
DOI: 10.1007/978-3-540-75694-1_18
|View full text |Cite
|
Sign up to set email alerts
|

NADA – Network Anomaly Detection Algorithm

Abstract: Abstract. This paper deals with a new iterative Network Anomaly Detection Algorithm -NADA, which accomplishes the detection, classification and identification of traffic anomalies. NADA fully provides all information required limiting the extent of anomalies by locating them in time, by classifying them, and identifying their features as, for instance, the source and destination addresses and ports involved. To reach its goal, NADA uses a generic multi-featured algorithm executed at different time scales and a… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2008
2008
2013
2013

Publication Types

Select...
2
1
1

Relationship

1
3

Authors

Journals

citations
Cited by 4 publications
(3 citation statements)
references
References 5 publications
0
3
0
Order By: Relevance
“…For example, Fontugne et al [2] introduced a new type of algorithm for detecting anomalies in the Internet traffic by applying the Hough transform [2]. The anomalous traffic flows are detected through behavior-based signatures, similar to the graphical signatures introduced by Farraposo et al [12] for classifying anomalies. The key idea of this technique is that anomalous activities appear as "lines" on temporal-spatial planes, which are easily identified by an edge-detection algorithm.…”
Section: Related Workmentioning
confidence: 98%
“…For example, Fontugne et al [2] introduced a new type of algorithm for detecting anomalies in the Internet traffic by applying the Hough transform [2]. The anomalous traffic flows are detected through behavior-based signatures, similar to the graphical signatures introduced by Farraposo et al [12] for classifying anomalies. The key idea of this technique is that anomalous activities appear as "lines" on temporal-spatial planes, which are easily identified by an edge-detection algorithm.…”
Section: Related Workmentioning
confidence: 98%
“…We propose a new approach to detecting anomalies based on pattern recognition, where anomalous traffic flows are detected through behavior-based signatures, similar to the graphical signatures introduced by Farraposo et al [6] for classifying anomalies.…”
Section: Image Processing-based Approachesmentioning
confidence: 99%
“…Thus these anomalies penalize legitimate applications from using optimal resources. Detecting anomalies quickly and accurately in network traffic is a hot topic in the current field of research (e.g., [2,12,14,4,17,9,6,10]). It is essential to characterize network anomalies to be able to identify them.…”
Section: Introductionmentioning
confidence: 99%