2020
DOI: 10.1002/nem.2129
|View full text |Cite
|
Sign up to set email alerts
|

Network anomaly detection using a cross‐correlation‐based long‐range dependence analysis

Abstract: The detection of anomalies in network traffic is an important task in today's Internet. Among various anomaly detection methods, the techniques based on examination of the long-range dependence (LRD) behavior of network traffic stands out to be powerful. In this paper, we reveal anomalies in aggregated network traffic by examining the LRD behavior based on the cross-correlation function of the bidirectional control and data planes traffic. Specifically, observing that the conventional cross-correlation functio… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
7
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(7 citation statements)
references
References 36 publications
0
7
0
Order By: Relevance
“…Data binning is a preprocessing step for presenting the network flow events in a form on which analysis algorithms can be applied. Binning the network events have been applied as a preprocessing step to detect low volume and short duration attacks [7] and separate a set of network traffic measurements that correspond to normal and abnormal behaviour [27]. A time-bin is defined as a window of one fixed time interval.…”
Section: A Temporal Correlationmentioning
confidence: 99%
See 4 more Smart Citations
“…Data binning is a preprocessing step for presenting the network flow events in a form on which analysis algorithms can be applied. Binning the network events have been applied as a preprocessing step to detect low volume and short duration attacks [7] and separate a set of network traffic measurements that correspond to normal and abnormal behaviour [27]. A time-bin is defined as a window of one fixed time interval.…”
Section: A Temporal Correlationmentioning
confidence: 99%
“…Their method used Principal Component Analysis to identify normal and abnormal network conditions by using a set of network traffic measurements. In [7], the authors modified the cross-correlation function to improve the anomaly detection performance of the conventional cross-correlation function. In [4], the authors setup shallow Convolution Neural Network (CNN), moderate CNN and deep CNN to assess enhancements for proactive attack handling.…”
Section: Related Workmentioning
confidence: 99%
See 3 more Smart Citations