IEEE Local Computer Network Conference 2010
DOI: 10.1109/lcn.2010.5735749
|View full text |Cite
|
Sign up to set email alerts
|

Modeling spatial and temporal behavior of Internet traffic anomalies

Abstract: A new approach based on graph wavelets for analyzing the spatial and temporal behavior of Internet traffic anomalies is presented. This approach is applied to Internet2 traffic measurements to evaluate the time duration and spatial spread (number of links affected) of anomalies. Based on the empirical results, a node model is proposed that captures the behavior of anomalies at individual network nodes. The model considers various aspects of anomalies, such as its origin, termination, propagation, duration and … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
14
0

Year Published

2014
2014
2019
2019

Publication Types

Select...
4
1

Relationship

1
4

Authors

Journals

citations
Cited by 6 publications
(14 citation statements)
references
References 28 publications
0
14
0
Order By: Relevance
“…For example, identifying temporal anomalies in internet traffic 33 and techniques detecting temporal based anomalies in data sources available on UNIX systems. Temporal anomalies occur when data is determined to be irregular if its temporal occurrence is unusual.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…For example, identifying temporal anomalies in internet traffic 33 and techniques detecting temporal based anomalies in data sources available on UNIX systems. Temporal anomalies occur when data is determined to be irregular if its temporal occurrence is unusual.…”
Section: Related Workmentioning
confidence: 99%
“…Temporal anomalies occur when data is determined to be irregular if its temporal occurrence is unusual. For example, identifying temporal anomalies in internet traffic 33 and techniques detecting temporal based anomalies in data sources available on UNIX systems.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Following [28], we consider volume anomalies. The extraction process is described in detail in [29] and is outlined in Appendix. This scheme de-trends to remove normal traffic and applies a threshold to separate anomalies.…”
Section: Anomaly Activity At a Nodementioning
confidence: 99%
“…Graph wavelets [28] enable spatial traffic analysis at different granularities. A graph wavelet-based approach for modelling Internet traffic anomalies is presented in [28], whereas Bandara et al [29] used graph wavelets without losing granularity.…”
Section: Introductionmentioning
confidence: 99%