2006
DOI: 10.1007/11753810_12
|View full text |Cite
|
Sign up to set email alerts
|

Traffic Anomaly Detection and Characterization in the Tunisian National University Network

Abstract: Abstract. Traffic anomalies are characterized by unusual and significant changes in a network traffic behavior. They can be malicious or unintentional. Malicious traffic anomalies can be caused by attacks, abusive network usage and worms or virus propagations. However unintentional ones can be caused by failures, flash crowds or router misconfigurations. In this paper, we present an anomaly detection system derived from the anomaly detection schema presented by Mei-Ling Shyu in [12] and based on periodic SNMP … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
9
0

Year Published

2008
2008
2018
2018

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 11 publications
(9 citation statements)
references
References 12 publications
0
9
0
Order By: Relevance
“…Even though the used traffic sets are different so that the comparison of the results may inadequate in this stage of work, the detection rate of our mechanism is relatively high compared to those results. In [28], the authors used a traffic set that is as similar as ours for anomaly detection. They collected the campus network traffic from Tunisian National University for forty five days and developed a Anomaly Detection System (ADS).…”
Section: Numerical Resultsmentioning
confidence: 99%
“…Even though the used traffic sets are different so that the comparison of the results may inadequate in this stage of work, the detection rate of our mechanism is relatively high compared to those results. In [28], the authors used a traffic set that is as similar as ours for anomaly detection. They collected the campus network traffic from Tunisian National University for forty five days and developed a Anomaly Detection System (ADS).…”
Section: Numerical Resultsmentioning
confidence: 99%
“…Data collection is easy to become the performance bottleneck of IDS, because the efficiency of data collection module in IDS directly affects the performance of intrusion detection. As a result, data collection is crucial with regard to the performance of IDS [4], [5]. Prior studies used various ways to collect security-related data for intrusion detection.…”
Section: ) Intrusion Detectionmentioning
confidence: 99%
“…Puttini et al [15] applied the associated Bayesian classification to the SNMP MIB variables to detect anomalous network traffic behavior in Mobile Ad Hoc Networks (MANET). Ramah et al [16] developed an anomaly detection system using periodic SNMP data collection which is derived from a PCA (Principle Component Analysis) based unsupervised anomaly detection scheme proposed by Shyu et al [17]. According to our literature review, these studies focused on the detection of intrusion from normal traffic, but most of them did not consider the determination of attack types, such as TCP-SYN Flooding, UDP flooding, ICMP flooding, etc.…”
Section: Introductionmentioning
confidence: 99%
“…Some studies [4,5,[14][15][16][17][18] used SNMP MIB data for a intrusion detection. Li et al [4] developed a system named as MAID which uses SNMP MIB-II data for anomaly detection.…”
Section: Introductionmentioning
confidence: 99%