Network traffic anomalies detection and identification with flow monitoring

@article{Nguyen2008NetworkTA,
  title={Network traffic anomalies detection and identification with flow monitoring},
  author={Huy Anh Nguyen and Tam V. Nguyen and Dong Il Kim and Deokjai Choi},
  journal={2008 5th IFIP International Conference on Wireless and Optical Communications Networks (WOCN '08)},
  year={2008},
  pages={1-5}
}
Network management and security is currently one of the most vibrant research areas, among which, research on detecting and identifying anomalies has attracted a lot of interest. Researchers are still struggling to find an effective and lightweight method for anomaly detection purpose. In this paper, we propose a simple, robust method that detects network anomalous traffic data based on flow monitoring. Our method works based on monitoring the four predefined metrics that capture the flow… CONTINUE READING
Highly Cited
This paper has 21 citations. REVIEW CITATIONS

From This Paper

Figures, tables, and topics from this paper.

Citations

Publications citing this paper.
Showing 1-10 of 14 extracted citations

References

Publications referenced by this paper.
Showing 1-8 of 8 references

Papagalou, “Application of Anomaly Detection Algorithms for Detecting SYN Flooding Attacks

  • F.V.A. Siris
  • IEEE Global Telecommunications Conference,
  • 2004

Brutag, “Aberrant Behavior Detection in Time Series for Network Monitoring

  • J D.
  • LISA
  • 2000
1 Excerpt

Introduction to Time Series and Forecasting

  • Peter J. Brockwell, Richard A. Davis
  • 1996
2 Excerpts

Similar Papers

Loading similar papers…