Wavelet-based Real Time Detection of Network Traffic Anomalies

@article{Huang2006WaveletbasedRT,
  title={Wavelet-based Real Time Detection of Network Traffic Anomalies},
  author={Chin-Tser Huang and Sachin Thareja and Yong-June Shin},
  journal={2006 Securecomm and Workshops},
  year={2006},
  pages={1-7}
}
Real time network monitoring for intrusions is offered by various host and network based intrusion detection systems. These systems largely use signature or pattern matching techniques at the core and thus are ineffective in detecting unknown anomalous activities. In this paper, we apply signal processing techniques in intrusion detection systems, and develop and implement a framework, called Waveman, for real time wavelet-based analysis of network traffic anomalies. Then, we use two metrics… CONTINUE READING
Highly Cited
This paper has 44 citations. REVIEW CITATIONS

Citations

Publications citing this paper.
Showing 1-10 of 29 extracted citations

Anomaly Detection in network traffic and role of wavelets

2010 2nd International Conference on Computer Engineering and Technology • 2010
View 4 Excerpts
Highly Influenced

Network Anomaly Detection Based on Wavelet Analysis

EURASIP J. Adv. Sig. Proc. • 2009
View 5 Excerpts
Highly Influenced

Designing a hybrid approach with computational analysis and visual analytics to detect network intrusions

2017 IEEE 7th Annual Computing and Communication Workshop and Conference (CCWC) • 2017
View 2 Excerpts

A method of network workload generation for evaluation of intrusion detection systems in SDN environment

2016 International Conference on Military Communications and Information Systems (ICMCIS) • 2016
View 2 Excerpts

A Real-Time Network Traffic Anomaly Detection System Based on Storm

2015 7th International Conference on Intelligent Human-Machine Systems and Cybernetics • 2015

References

Publications referenced by this paper.
Showing 1-10 of 19 references

A signal analysis of network traffic anomalies

Internet Measurement Workshop • 2002
View 4 Excerpts
Highly Influenced

IPFIX Protocol Specification, Internet- Draft (work in progress), draft-ietf-ipfix-protocol- 22.txt

B. Claise
2006
View 1 Excerpt

Wavelet-based approach to detect shared congestion

M. Kim, S. Lam, T. Kim, Y. Shin, E. J. Powers
Proceedings of ACM SIGCOMM’04, Portland, Oregon, Aug. 2004. • 2004
View 1 Excerpt

Anomaly detection of web-based attacks

ACM Conference on Computer and Communications Security • 2003
View 1 Excerpt

nProbe : an Open Source NetFlow Probe for Gigabit Networks

Luca Deri, A. NETikosS.p., Via Matteucci
2003
View 1 Excerpt

Similar Papers

Loading similar papers…