Analyzing the Number of Varieties in Frequently Found Flows

  title={Analyzing the Number of Varieties in Frequently Found Flows},
  author={Y. Shomura and Y. Watanabe and Kenichi Yoshida},
  journal={IEICE Trans. Commun.},
  • Y. Shomura, Y. Watanabe, Kenichi Yoshida
  • Published 2008
  • Computer Science
  • IEICE Trans. Commun.
  • Abnormal traffic that causes various problems on the Internet, such as P2P flows, DDoS attacks, and Internet worms, is increasing; therefore, the importance of methods that identify and control abnormal traffic is also increasing. Though the application of frequent-itemset-mining techniques is a promising way to analyze Internet traffic, the huge amount of data on the Internet prevents such techniques from being effective. To overcome this problem, we have developed a simple frequent-itemset… CONTINUE READING
    14 Citations

    Topics from this paper.

    A Traffic Monitoring Method for High Speed Networks
    • 4
    A Traffic Analysis Using Cardinalities and Header Information
    • 3
    A Flow Analysis for Mining Traffic Anomalies
    • 13
    • Highly Influenced
    A Method for Analyzing Network Traffic Using Cardinality Information in Firewall Logs
    • 1
    Abnormal Tra ffi c Detection Circuit with Real-time Cardinality Counter S huji S annomiya
    Cardinality Counting Circuit for Real-Time Abnormal Traffic Detection
    • 3
    Enhancing performance of cardinality analysis by packet filtering
    • 1
    Detecting Stealthy Spreaders by Random Aging Streaming Filters
    • 4
    • PDF
    An NMF-Based Traffic Classification Approach towards Anomaly Detection for Massive Sensors


    Stream Mining for Network Management
    • 9
    Frequency Estimation of Internet Packet Streams with Limited Space
    • 487
    • PDF
    Identifying elephant flows through periodically sampled packets
    • 174
    • PDF
    Bitmap Algorithms for Counting Active Flows on High-Speed Links
    • 305
    • PDF
    Detecting distributed denial-of-service attacks by analyzing TCP SYN packets statistically
    • 62
    • PDF
    Space efficient mining of multigraph streams
    • 132
    • PDF
    Inverting sampled traffic
    • 141
    • PDF
    Attacking DDoS at the source
    • 508
    • PDF