2010
DOI: 10.1007/978-3-642-16626-6_14
|View full text |Cite
|
Sign up to set email alerts
|

Improving Network Security through Traffic Log Anomaly Detection Using Time Series Analysis

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2014
2014
2020
2020

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 15 publications
(3 citation statements)
references
References 8 publications
0
3
0
Order By: Relevance
“…For example, records with byte counts between 1 and 3 are recorded using magnitude 1 and records with a byte count from 4 to 7 recorded with magnitude 2. The number of packets and bytes is therefore already bucketed so as to obscure small differences and highlight large ones [24]. The information was collected in real time and then processed to see what basic conclusions we could reach from the data.…”
Section: Descriptionmentioning
confidence: 99%
“…For example, records with byte counts between 1 and 3 are recorded using magnitude 1 and records with a byte count from 4 to 7 recorded with magnitude 2. The number of packets and bytes is therefore already bucketed so as to obscure small differences and highlight large ones [24]. The information was collected in real time and then processed to see what basic conclusions we could reach from the data.…”
Section: Descriptionmentioning
confidence: 99%
“…Time series is a series of data points indexed in time order, which is widely existed in fields of medical [6,10,26], business [18], industry [20,25], cyber security [17,24] and so on. Time series mining is one of the attractive research topics and a key issue for the last decade, such as classification [22], clustering [15], anomaly detection [19,27], time series visualization [9,13].…”
Section: Introductionmentioning
confidence: 99%
“…Currently, particularly intensively developed methods of intrusion/ attack detection are those using the notion of anomaly in the network traffic [29,26]. One of possible solutions is anomaly detection based on statistical models describing the analyzed network traffic as time series.…”
Section: Introductionmentioning
confidence: 99%