2015
DOI: 10.1016/j.simpat.2014.02.002
|View full text |Cite
|
Sign up to set email alerts
|

On monitoring and predicting mobile network traffic abnormality

Abstract: Traffic analysis and traffic abnormality detection are emerged as an efficient way of detecting network attacks in recent years. The existing approaches can be improved by introducing a new model and a new analysis method of network user's traffic behaviors. The description dimensions to network user's traffic behaviors in the current approaches are high, resulting in high processing complexity, high delay in differentiating an individual user's abnormal traffic behavior from massive network data, and low dete… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
11
0

Year Published

2016
2016
2022
2022

Publication Types

Select...
9

Relationship

1
8

Authors

Journals

citations
Cited by 20 publications
(11 citation statements)
references
References 23 publications
0
11
0
Order By: Relevance
“…In cellular networks, the mobile IP traffic classification can be performed at different levels either using the port, the packet payload [10,11], or the statistical flow distribution [12]. For instance, [13] collected IP traffic extracted from mobile networks in fixed time windows. Statistical based features from normal and abnormal traffic are computed, and a classifier is trained for the analysis of the massive network users' traffic behaviors.…”
Section: Related Workmentioning
confidence: 99%
“…In cellular networks, the mobile IP traffic classification can be performed at different levels either using the port, the packet payload [10,11], or the statistical flow distribution [12]. For instance, [13] collected IP traffic extracted from mobile networks in fixed time windows. Statistical based features from normal and abnormal traffic are computed, and a classifier is trained for the analysis of the massive network users' traffic behaviors.…”
Section: Related Workmentioning
confidence: 99%
“…This characteristic makes them suitable for feature Some of them are computed under the assumption that the properties values are normally distributed, which might not be true for some cases. [110], [95], [96], [97], [111], [112], [113], [114], [115], [116], [117], [118], [119], [120], [121], [122], [123], [124], [125], [126], [127], [128], [129], [96], [130], [131], [132], [133], [134], [106], [135], [136], [137], [138], [105], [139], [140], [107], [141], [142], [143] Graph based features Internet interactions are modeled as graphs and valuable features can be extracted from these representations They are ideal for understanding communication patterns…”
Section: Feature Reduction and Selectionmentioning
confidence: 99%
“…There are some studies in the literature for the detection of abnormal traffic on the network [10–12 ]. Several methodologies and data classification techniques are used to detect abnormal traffic in network data [13, 14 ].…”
Section: Introductionmentioning
confidence: 99%