2018
DOI: 10.3103/s0146411618080187
|View full text |Cite
|
Sign up to set email alerts
|

Security Analysis Based on Controlling Dependences of Network Traffic Parameters by Wavelet Transformation

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 20 publications
(6 citation statements)
references
References 3 publications
0
6
0
Order By: Relevance
“…Time series of data are used to analyze self-similar processes. The input data for intrusion detection systems are parameters extracted from traffic [2,8,9] or time series [2,3,7,10]. The data preparation system aggregates traffic statistics over a set of specified time periods.…”
Section: Data Aggregation When Analyzing Self-similar Processesmentioning
confidence: 99%
See 1 more Smart Citation
“…Time series of data are used to analyze self-similar processes. The input data for intrusion detection systems are parameters extracted from traffic [2,8,9] or time series [2,3,7,10]. The data preparation system aggregates traffic statistics over a set of specified time periods.…”
Section: Data Aggregation When Analyzing Self-similar Processesmentioning
confidence: 99%
“…For example, to detect traffic anomalies [1,2]. In this case, not only batch systems for processing big data using Map-Reduce technology are used [3]. For such tasks, one need to use streaming processing modules [4], including special Big data aggregation components [5].…”
Section: Introductionmentioning
confidence: 99%
“…These are network traffic [6][7][8] and physical node data [9,10]. Today, there are a large number of works aimed at analyzing network traffic in monitoring systems to solve various security problems [11][12][13]. Recently, this field has been dominated by works using streaming information processing technologies [14] or (earlier) combining streaming and batch technologies [6,15].…”
Section: Related Workmentioning
confidence: 99%
“…The combination of these data is used to detect anomalies by various methods in industrial cyberphysical systems [8][9][10]13]. The heterogeneity of the physical process sensors is an additional challenge.…”
Section: Data Preprocessing In the Cpsmentioning
confidence: 99%
“…is built on the basis of passive strategies, its effect is not desirable if the business process' security isn't regarded as not strengthening the business process, the operation system and the computer hosts, it only depends on the computer drills with the thread codes to achieve effect. Thus, it's important to evaluate the computer network security [49]- [53]. The evaluating problems of computer network security are a classical multiple attribute decision making (MADM) problems.…”
Section: Introductionmentioning
confidence: 99%