2018
DOI: 10.3103/s0146411618050115
|View full text |Cite
|
Sign up to set email alerts
|

Network Traffic Anomalies Detection Using a Fixing Method of Multifractal Dimension Jumps in a Real-Time Mode

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
3
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 15 publications
(4 citation statements)
references
References 10 publications
0
3
0
Order By: Relevance
“…This feature has also been proved to be the basis for judging normal flow in subsequent studies [18,19]. Sheluhin et al [20] used a multiscale analysis method combined with wavelet analysis to study the multi-fractal characteristics of network traffic and realised the generation of abnormal traffic by monitoring fractal dimension jumps. Pei et al [21] proposed a usercustomisable personalised anomaly detection framework to detect the generation of abnormal traffic in the network and also presented an anomaly detection method with long shortterm memory.…”
Section: Related Workmentioning
confidence: 99%
“…This feature has also been proved to be the basis for judging normal flow in subsequent studies [18,19]. Sheluhin et al [20] used a multiscale analysis method combined with wavelet analysis to study the multi-fractal characteristics of network traffic and realised the generation of abnormal traffic by monitoring fractal dimension jumps. Pei et al [21] proposed a usercustomisable personalised anomaly detection framework to detect the generation of abnormal traffic in the network and also presented an anomaly detection method with long shortterm memory.…”
Section: Related Workmentioning
confidence: 99%
“…Data mining and machine learning have been applied for automated network traffic analysis. However, shallow learning models like support vector machines (SVMs) and random forests have limited capability in handling complex networks with dynamic behavior [3]. Deep learning has become a powerful force in many domains.…”
Section: Introductionmentioning
confidence: 99%
“…This study aims to analyze the various techniques used for detecting network anomalies and their effectiveness in improving the security of networks. [5], [6] The KDD NSL dataset, which is a widely used research tool in network security, contains traffic data that has been simulated to attack different types of DoS attacks. This was created by NIST to support research related to intrusion detection systems.…”
Section: Introductionmentioning
confidence: 99%