Silvia Farraposo

Learn More
—The occurrence of a traffic anomaly is always responsible for a degradation of performance. The anomaly can be observable, at some scale, in different ways: an increase in the number of packets, an increase in the number of bytes, a concentration of packets around a port number, etc. In this paper we propose an anomaly independent methodology for detecting(More)
The Internet is a network of such significance that it is now the target of many attacks. Hackers have been first targeting users, but since few years they are now also attacking the network itself. This is why several kinds of attacks have already been studied, classified and resolved. However, this is not true for Denial of Service (DoS) attacks, for(More)
This paper deals with a new iterative Network Anomaly Detection Algorithm – NADA, which accomplishes the detection, classification and identification of traffic anomalies. NADA fully provides all information required limiting the extent of anomalies by locating them in time, by classifying them, and identifying their features as, for instance, the source(More)
AIM To perform a systematic review to assess the accuracy of first-trimester ultrasound (US) in the diagnoses of major structural malformations in chromosomally normal fetuses. METHODS References were obtained from the MEDLINE database, without time range limitations. For each, the risk of bias was evaluated and the important data were extracted. Only(More)
Several recent traffic monitoring studies proved that traffic is highly variable (sometimes not stationary), and in any cases exhibiting many disruptions in its throughput, that of course are damageable for providing a stable QoS. If some of these disruptions can be legitimate variations of traffic (because a user suddenly generates a big flow or flash(More)
In this paper we present a methodology for detecting traffic anomalies. To accomplish that, and as a demarcation from similar works, we combine multi-scale with a multi-criteria tomography process analysis. With a complete knowledge of traffic anomalies, we intend to define anomalies signatures that could be used in a large range of scopes as traffic(More)
  • 1