2011
DOI: 10.1111/j.1468-0394.2010.00576.x
|View full text |Cite
|
Sign up to set email alerts
|

Statistical and signal‐based network traffic recognition for anomaly detection

Abstract: In this paper, a framework for recognizing network traffic in order to detect anomalies is proposed.We propose to combine and correlate parameters from different layers in order to detect 0-day attacks and reduce false positives. Moreover, we propose to combine statistical and signal-based features. The major contribution of this paper is novel framework for network security based on the correlation approach as well as new signal-based algorithm for intrusion detection on the basis of the Matching Pursuit (MP)… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
12
0
1

Year Published

2011
2011
2017
2017

Publication Types

Select...
4
3
2

Relationship

0
9

Authors

Journals

citations
Cited by 31 publications
(13 citation statements)
references
References 17 publications
0
12
0
1
Order By: Relevance
“…Residuals are then put into an outlier detection algorithm to make decisions. In addition, [6,[11][12] are other examples of signal-based research for network anomaly detection.…”
Section: A Signal-based Anomaly Detectionmentioning
confidence: 98%
“…Residuals are then put into an outlier detection algorithm to make decisions. In addition, [6,[11][12] are other examples of signal-based research for network anomaly detection.…”
Section: A Signal-based Anomaly Detectionmentioning
confidence: 98%
“…Although the authors discuss directions to parallelize the algorithm, there is no evaluation focusing on how such system would address the high throughput and low latency analysis challenges addressed by STONE . Choras et al (2012) present an anomaly detection framework based on signal-based features extraction and consider 15 features decomposing featuresignal with a matching pursuit. Signal decomposition is used to create profiles that are later used to detect anomalies.…”
Section: Ddos Defense Based On Expert Systemsmentioning
confidence: 99%
“…(B) Related Works. In order to detect anomalies in network, correlate parameters from different layers should be combined [8]. Some papers focus on building a new hierarchical framework for intrusion detection as well as data processing based on the feature classification and selection [9][10][11].…”
Section: Anomaly Detectionmentioning
confidence: 99%