Abnormal Network Behavior Analysis System Based on Traffic Monitoring

Article Preview

Abstract:

This study based on characteristics of network traffic is significant, it can improve network design, improve network performance, is often used in the abnormal traffic detection and so on. In this paper, the significance of abnormal flow monitoring is design based on an analysis of network behavior anomaly traffic monitoring system, the system for use of the network traffic characteristics of network attacks detected has a good prospect.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

802-805

Citation:

Online since:

February 2014

Export:

Price:

* - Corresponding Author

[1] M. Bottero, B. Dalla Chiara, F.P. Deflorio: Wireless sensor networks for traffic monitoring in a logistic centre, Transportation Research Part C: Emerging Technologies, Vol. 26 (2013), P. 99-124.

DOI: 10.1016/j.trc.2012.06.008

Google Scholar

[2] N. Messai, P. Thomas, D. Lefebvre: Neural networks for local monitoring of traffic magnetic sensors, Control Engineering Practice, Vol. 13 (2005), P. 67-80.

DOI: 10.1016/j.conengprac.2004.02.005

Google Scholar

[3] M. Iliofotou, H. Kim, M. Faloutsos, M. Mitzenmacher: Graption: A graph-based P2P traffic classification framework for the internet backbone, Computer Networks, Vol. 55 (2011), P. 1909-(1920).

DOI: 10.1016/j.comnet.2011.01.020

Google Scholar

[4] G. Giorgi, C. Narduzzi: Rate-interval curves - A tool for the analysis and monitoring of network traffic, Performance Evaluation, Vol. 65 (2008), P. 441-462.

DOI: 10.1016/j.peva.2007.12.003

Google Scholar

[5] T. Field, U. Harder, P. Harrison: Network traffic behaviour in switched Ethernet systems, Performance Evaluation, Vol. 58 (2004), P. 243-260.

DOI: 10.1016/j.peva.2004.07.017

Google Scholar

[6] F. Ricciato, F. Vacirca, P. Svoboda: Diagnosis of capacity bottlenecks via passive monitoring in 3G networks: An empirical analysis, Computer Networks, Vol. 51 (2007), P. 1205-1231.

DOI: 10.1016/j.comnet.2006.07.011

Google Scholar

[7] P. B. Ros, G. Iannaccone, J. S. Cuxart, J. S. Pareta: Robust network monitoring in the presence of non-cooperative traffic queries, Computer Networks, Vol. 53 (2009), P. 310-321.

DOI: 10.1016/j.comnet.2008.10.007

Google Scholar

[8] F. Mata, J. L. G. Dorado, J. Aracil: Detection of traffic changes in large-scale backbone networks: The case of the Spanish academic network, Computer Networks, Vol. 56 (2012), P. 686-702.

DOI: 10.1016/j.comnet.2011.10.017

Google Scholar

[9] B. Li, J. Springer, G. Bebis, M. H. Gunes: A survey of network flow applications, Journal of Network and Computer Applications, Vol. 36 (2013), P. 567-581.

DOI: 10.1016/j.jnca.2012.12.020

Google Scholar

[10] A. N. Mahmood, J. Hu, Z. Tari, C. Leckie: Critical infrastructure protection: Resource efficient sampling to improve detection of less frequent patterns in network traffic, Journal of Network and Computer Applications, Vol. 33 (2010), P. 491-502.

DOI: 10.1016/j.jnca.2010.01.003

Google Scholar