Automated Classification of Network Traffic Anomalies

  title={Automated Classification of Network Traffic Anomalies},
  author={Guilherme Fernandes and Philippe Owezarski},
Network traffic anomalies detection and characterization has been a hot topic of research for many years. Although the field is very advanced in the detection of network traffic anomalies, accurate automated classification is still a very challenging and unmet problem. This paper presents a new algorithm for automated classification of network traffic anomalies. The algorithm relies on three steps: (i) after an anomaly has been detected, identify all (or most) related packets or flow records… CONTINUE READING
Highly Cited
This paper has 30 citations. REVIEW CITATIONS

From This Paper

Figures, tables, and topics from this paper.


Publications citing this paper.
Showing 1-10 of 20 extracted citations

Unsupervised Network Anomaly Detection Miss

Nita V. Jaiswal, Prof. D. M. Dakhne
View 4 Excerpts
Highly Influenced

Revisit network anomaly ranking in datacenter network using re-ranking

2015 IEEE 4th International Conference on Cloud Networking (CloudNet) • 2015
View 2 Excerpts

A taxonomy of anomalies in backbone network traffic

2014 International Wireless Communications and Mobile Computing Conference (IWCMC) • 2014
View 2 Excerpts

Coping with 0-day attacks through Unsupervised Network Intrusion Detection

2014 International Wireless Communications and Mobile Computing Conference (IWCMC) • 2014
View 1 Excerpt


Publications referenced by this paper.
Showing 1-10 of 17 references

Characterization of network-wide anomalies in traffic flows

Internet Measurement Conference • 2004
View 8 Excerpts
Highly Influenced

A signal analysis of network traffic anomalies

Internet Measurement Workshop • 2002
View 4 Excerpts
Highly Influenced

Automated classification of network traffic anomalies

G. Fernandes, P. Owezarski
LAAS Report No 08468 • 2008
View 1 Excerpt

Detection and identification of network anomalies using sketch subspaces

Internet Measurement Conference • 2006
View 3 Excerpts

Similar Papers

Loading similar papers…