語系:
繁體中文
English
說明(常見問題)
回圖書館首頁
手機版館藏查詢
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Detection of network anomalies and n...
~
Jiang, Jun.
FindBook
Google Book
Amazon
博客來
Detection of network anomalies and novel attacks in the Internet via statistical network traffic separation and normality prediction.
紀錄類型:
書目-電子資源 : Monograph/item
正題名/作者:
Detection of network anomalies and novel attacks in the Internet via statistical network traffic separation and normality prediction./
作者:
Jiang, Jun.
面頁冊數:
83 p.
附註:
Source: Dissertation Abstracts International, Volume: 66-08, Section: B, page: 4395.
Contained By:
Dissertation Abstracts International66-08B.
標題:
Engineering, Electronics and Electrical. -
電子資源:
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=3186446
ISBN:
9780542283901
Detection of network anomalies and novel attacks in the Internet via statistical network traffic separation and normality prediction.
Jiang, Jun.
Detection of network anomalies and novel attacks in the Internet via statistical network traffic separation and normality prediction.
- 83 p.
Source: Dissertation Abstracts International, Volume: 66-08, Section: B, page: 4395.
Thesis (Ph.D.)--New Jersey Institute of Technology, 2005.
With the advent and the explosive growth of the global Internet and the electronic commerce environment, adaptive/automatic network and service anomaly detection is fast gaining critical research and practical importance. If the next generation of network technology is to operate beyond the levels of current networks, it will require a set of well-designed tools for its management that will provide the capability of dynamically and reliably identifying network anomalies. Early detection of network anomalies and performance degradations is a key to rapid fault recovery and robust networking, and has been receiving increasing attention lately.
ISBN: 9780542283901Subjects--Topical Terms:
626636
Engineering, Electronics and Electrical.
Detection of network anomalies and novel attacks in the Internet via statistical network traffic separation and normality prediction.
LDR
:03688nmm 2200313 4500
001
1827186
005
20061222091115.5
008
130610s2005 eng d
020
$a
9780542283901
035
$a
(UnM)AAI3186446
035
$a
AAI3186446
040
$a
UnM
$c
UnM
100
1
$a
Jiang, Jun.
$3
1678184
245
1 0
$a
Detection of network anomalies and novel attacks in the Internet via statistical network traffic separation and normality prediction.
300
$a
83 p.
500
$a
Source: Dissertation Abstracts International, Volume: 66-08, Section: B, page: 4395.
500
$a
Adviser: Symeon Papavassiliou.
502
$a
Thesis (Ph.D.)--New Jersey Institute of Technology, 2005.
520
$a
With the advent and the explosive growth of the global Internet and the electronic commerce environment, adaptive/automatic network and service anomaly detection is fast gaining critical research and practical importance. If the next generation of network technology is to operate beyond the levels of current networks, it will require a set of well-designed tools for its management that will provide the capability of dynamically and reliably identifying network anomalies. Early detection of network anomalies and performance degradations is a key to rapid fault recovery and robust networking, and has been receiving increasing attention lately.
520
$a
In this dissertation we present a network anomaly detection methodology, which relies on the analysis of network traffic and the characterization of the dynamic statistical properties of traffic normality, in order to accurately and timely detect network anomalies. Anomaly detection is based on the concept that perturbations of normal behavior suggest the presence of anomalies, faults, attacks etc. This methodology can be uniformly applied in order to detect network attacks, especially in cases where novel attacks are present and the nature of the intrusion is unknown.
520
$a
Specifically, in order to provide an accurate identification of the normal network traffic behavior, we first develop an anomaly-tolerant non-stationary traffic prediction technique, which is capable of removing both pulse and continuous anomalies. Furthermore we introduce and design dynamic thresholds, and based on them we define adaptive anomaly violation conditions, as a combined function of both the magnitude and duration of the traffic deviations. Numerical results are presented that demonstrate the operational effectiveness and efficiency of the proposed approach, under different anomaly traffic scenarios and attacks, such as mail-bombing and UDP flooding attacks.
520
$a
In order to improve the prediction accuracy of the statistical network traffic normality, especially in cases where high burstiness is present, we propose, study and analyze a new network traffic prediction methodology, based on the "frequency domain" traffic analysis and filtering, with the objective of enhancing the network anomaly detection capabilities. Our approach is based on the observation that the various network traffic components, are better identified, represented and isolated in the frequency domain. As a result, the traffic can be effectively separated into a baseline component, that includes most of the low frequency traffic and presents low burstiness, and the short-term traffic that includes the most dynamic part. (Abstract shortened by UMI.)
590
$a
School code: 0152.
650
4
$a
Engineering, Electronics and Electrical.
$3
626636
650
4
$a
Computer Science.
$3
626642
690
$a
0544
690
$a
0984
710
2 0
$a
New Jersey Institute of Technology.
$3
1028843
773
0
$t
Dissertation Abstracts International
$g
66-08B.
790
1 0
$a
Papavassiliou, Symeon,
$e
advisor
790
$a
0152
791
$a
Ph.D.
792
$a
2005
856
4 0
$u
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=3186446
筆 0 讀者評論
館藏地:
全部
電子資源
出版年:
卷號:
館藏
1 筆 • 頁數 1 •
1
條碼號
典藏地名稱
館藏流通類別
資料類型
索書號
使用類型
借閱狀態
預約狀態
備註欄
附件
W9218049
電子資源
11.線上閱覽_V
電子書
EB
一般使用(Normal)
在架
0
1 筆 • 頁數 1 •
1
多媒體
評論
新增評論
分享你的心得
Export
取書館
處理中
...
變更密碼
登入