Network anomaly detection using autonomous system flow aggregates

@article{Johnson2014NetworkAD,
  title={Network anomaly detection using autonomous system flow aggregates},
  author={Thienne Johnson and Loukas Lazos},
  journal={2014 IEEE Global Communications Conference},
  year={2014},
  pages={544-550}
}
Detecting malicious traffic streams in modern computer networks is a challenging task due to the growing traffic volume that must be analyzed. Traditional anomaly detection systems based on packet inspection face a scalability problem in terms of computational and storage capacity. One solution to this scalability problem is to analyze traffic based on IP flow aggregates. However, IP aggregates can still result in prohibitively large datasets for networks with heavy traffic loads. In this paper… CONTINUE READING

Citations

Publications citing this paper.

References

Publications referenced by this paper.
Showing 1-10 of 22 references

Network Anomaly Detection: Methods, Systems and Tools

IEEE Communications Surveys & Tutorials • 2014
View 5 Excerpts
Highly Influenced

Parametric Methods for Anomaly Detection in Aggregate Traffic

IEEE/ACM Transactions on Networking • 2011
View 5 Excerpts
Highly Influenced

Anomaly detection: A survey

ACM Comput. Surv. • 2009
View 4 Excerpts
Highly Influenced

and S

Y. Rekhter, T. Li
Hares. RFC 4271: Border gateway protocol 4 • 2006
View 3 Excerpts
Highly Influenced

Network anomaly detection: Methods

M. Bhuyan, D. Bhattacharyya, J. Kalita
systems and tools. Communications Surveys Tutorials, 1(99):1– 34 • 2013

Inferring geography from BGP raw data

2012 Proceedings IEEE INFOCOM Workshops • 2012
View 2 Excerpts

Low-Rate DDoS Attacks Detection and Traceback by Using New Information Metrics

IEEE Transactions on Information Forensics and Security • 2011
View 3 Excerpts

Similar Papers

Loading similar papers…