2013 IEEE 14th International Conference on High Performance Switching and Routing (HPSR) 2013
DOI: 10.1109/hpsr.2013.6602310
|View full text |Cite
|
Sign up to set email alerts
|

Studies in applying PCA and wavelet algorithms for network traffic anomaly detection

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2

Citation Types

0
9
0

Year Published

2013
2013
2024
2024

Publication Types

Select...
7
2

Relationship

0
9

Authors

Journals

citations
Cited by 22 publications
(9 citation statements)
references
References 20 publications
0
9
0
Order By: Relevance
“…For example, in order to analyze network traffic and detect anomalous connections from each network flow, IP address and port of the source and the destination host as well as number of transferred bytes can be extracted [NLLS11]. To solve a face recognition problem, the features extracted from a face image can involve coordinates of eyes, nasal wings and corners of the mouth [RHB11].…”
Section: Feature Extractionmentioning
confidence: 99%
“…For example, in order to analyze network traffic and detect anomalous connections from each network flow, IP address and port of the source and the destination host as well as number of transferred bytes can be extracted [NLLS11]. To solve a face recognition problem, the features extracted from a face image can involve coordinates of eyes, nasal wings and corners of the mouth [RHB11].…”
Section: Feature Extractionmentioning
confidence: 99%
“…Feature extraction reduce the representation of data to increase the performance of data processing since analyzing the full size raw data is time consuming and decrease the accuracy of output. For instance, to analyze network traffic for network-based intrusion detection, the application should gather the data from routers and extract information such as number of transferred bytes, packets, networks flows, IP addresses, protocol, port numbers and other useful features of network traffic for intrusion detection (Guyon & Elisseeff 2003, Liu & Yu 2005, Novakov et al 2013. Many researchers are suggesting using network flows for intrusion detection purposes .…”
Section: Data Selection and Feature Extractionmentioning
confidence: 99%
“…(ii) The machine-learning based approach [6][7][8] may encounter the following problems: firstly, it is difficult to select distribution functions and solve the parameters due to lack of samples; secondly, it is a time-consuming task to detect the anomalies when the dimensionality of the traffic and the size of its features expand dramatically. (iii) The signal-processing based approach [9][10][11] cannot recognise the small characteristic variations underlying in the traffic and obtain satisfactory classification results due to the slight fluctuation of the traffic.…”
Section: Introductionmentioning
confidence: 99%
“…Due to its special characteristics, some new challenges will emerge when the common‐used anomalous traffic detection techniques are applied to the controlled network including: (i) The statistics‐analysis based approach [3–5] cannot detect and discover the anomalous traffic occurring in a long interval or with subtle variations in the controlled network due to its relatively stable traffic characteristics. (ii) The machine‐learning based approach [6–8] may encounter the following problems: firstly, it is difficult to select distribution functions and solve the parameters due to lack of samples; secondly, it is a time‐consuming task to detect the anomalies when the dimensionality of the traffic and the size of its features expand dramatically. (iii) The signal‐processing based approach [9–11] cannot recognise the small characteristic variations underlying in the traffic and obtain satisfactory classification results due to the slight fluctuation of the traffic. …”
Section: Introductionmentioning
confidence: 99%