Our system is currently under heavy load due to increased usage. We're actively working on upgrades to improve performance. Thank you for your patience.
2020
DOI: 10.1109/access.2020.2983986
|View full text |Cite
|
Sign up to set email alerts
|

Network Traffic Anomaly Detection Algorithm Based on Intuitionistic Fuzzy Time Series Graph Mining

Abstract: Network traffic anomaly detection is an important technology in cyberspace security. Combining information entropy theory and a variable ordering heuristic intuitionistic fuzzy time series forecasting model, we present a traffic anomaly detection algorithm based on intuitionistic fuzzy time series graph mining. For multi-dimensional attribute entropy of network traffic data, we establish multiple parallel and independent variable ordering heuristic intuitionistic fuzzy time series forecasting models. At each m… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
3
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 7 publications
(3 citation statements)
references
References 14 publications
(20 reference statements)
0
3
0
Order By: Relevance
“…Error correction is carried out in the python statement of the candidate network application layer. According to the data classification standard, on the basis of capturing sensitive data in the whole DHCP protocol, the correlation between this statement and captured information is evaluated [11].  is assumed to be a random variable in DHCP protocol, and the process of judging this variable can be expressed as formula 123 (1).…”
Section: Python-based Network Traffic Anomaly Detection Methodsmentioning
confidence: 99%
“…Error correction is carried out in the python statement of the candidate network application layer. According to the data classification standard, on the basis of capturing sensitive data in the whole DHCP protocol, the correlation between this statement and captured information is evaluated [11].  is assumed to be a random variable in DHCP protocol, and the process of judging this variable can be expressed as formula 123 (1).…”
Section: Python-based Network Traffic Anomaly Detection Methodsmentioning
confidence: 99%
“…Also, an interval type-2 fuzzy logic system (IT2FLS) based on a fuzzy time series was proposed by [38]. A fuzzy time series model has been developed by combining the model with some techniques such as network traffic anomaly detection algorithm [39], complex network analysis [40] and C-Means clustering algorithm [41].…”
Section: B Review and Framework Of The Fuzzy Time Seriesmentioning
confidence: 99%
“…A subgraph of 𝐺 isomorphic to 𝑝 is called an embedding. GPM enables various important applications such as functional modules discovery [53,63], biochemical structures mining [12,43,47] and anomaly detection [6,28,29,48,54,68] and many others [17,30,57,64,67,71,76]. The key challenge of GPM is the need to enumerate a large number of subgraphs, e.g., with WikiVote, a small graph with merely 7k vertices, the number of vertex-induced 5-chain embeddings can reach 71 billion.…”
mentioning
confidence: 99%