Proceedings of the Second ACM SIGCOMM Workshop on Internet Measurment - IMW '02 2002
DOI: 10.1145/637201.637210
|View full text |Cite
|
Sign up to set email alerts
|

A signal analysis of network traffic anomalies

Abstract: Abstract--Identifying anomalies rapidly and accurately is critical to the efficient operation of large computer networks. Accurately characterizing important classes of anomalies greatly facilitates their identification; however, the subtleties and complexities of anomalous traffic can easily confound this process. In this paper we report results of signal analysis of four classes of network traffic anomalies: outages, flash crowds, attacks and measurement failures. Data for this study consists of IP flow and … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
286
0
11

Year Published

2013
2013
2022
2022

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 623 publications
(322 citation statements)
references
References 16 publications
(5 reference statements)
0
286
0
11
Order By: Relevance
“…The key issue for forensic investigators while during the forensic process is the validation of evidence (Barford et al, 2002). The integrity of the collected evidence has to be questioned at each stage of analysis.…”
Section: Resultsmentioning
confidence: 99%
See 2 more Smart Citations
“…The key issue for forensic investigators while during the forensic process is the validation of evidence (Barford et al, 2002). The integrity of the collected evidence has to be questioned at each stage of analysis.…”
Section: Resultsmentioning
confidence: 99%
“…Current forensics deals with two types of evidence analysis such as live analysis and dead analysis. Live analysis mainly monitors and gathers evidence from live networks and systems (Barford, Kline, Plonka, & Ron, 2002;Sy, 2009) and offline analysis deals with evidence processing after physical or logical imaging of the entire system.…”
Section: Background and Motivationmentioning
confidence: 99%
See 1 more Smart Citation
“…wavelet analysis) to internet traffic helps us isolate the characteristics of the traffic by extracting hidden patterns of high and low frequency information [26]. Many researchers used wavelet analysis to identify network anomalies by reconstructing network traffic data [27,28], compressing the data by applying two different thresholds from wavelet coefficients [29], and designing better wavelet filters to identify better local frequency information [30]. In the work by Barford et al [30], wavelet transformations were used to extract flow-based traffic abnormality by splitting the input signals into different ranges of frequencies (low, mid, and high frequencies).…”
Section: Related Workmentioning
confidence: 99%
“…If the predicted value and observed value differ significantly, an anomaly is detected. While wavelet processing has been employed in intrusion detection (Barford et al, 2002;Kim et al, 2004;Zanero and Savaresi, 2004) and prediction (Brutlag, 2000) has also been used, a combination of these techniques for network intrusion detection is novel.…”
Section: Work Statementmentioning
confidence: 99%