Bhuyan et al., 2017 - Google Patents
Networks and Network Traffic AnomaliesBhuyan et al., 2017
- Document ID
- 8444511656723559222
- Author
- Bhuyan M
- Bhattacharyya D
- Kalita J
- Publication year
- Publication venue
- Network Traffic Anomaly Detection and Prevention: Concepts, Techniques, and Tools
External Links
Snippet
Before discussing the actual detection and prevention of network traffic anomalies, we must introduce fundamental concepts on networks, network traffic, and traffic measurement. Therefore, this chapter is comprised of two parts. The first part discusses components of …
- 238000001514 detection method 0 abstract description 87
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance or administration or management of packet switching networks
- H04L41/06—Arrangements for maintenance or administration or management of packet switching networks involving management of faults or events or alarms
- H04L41/0654—Network fault recovery
- H04L41/0659—Network fault recovery by isolating the faulty entity
- H04L41/0663—Network fault recovery by isolating the faulty entity involving offline failover planning
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance or administration or management of packet switching networks
- H04L41/16—Network management using artificial intelligence
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L43/00—Arrangements for monitoring or testing packet switching networks
- H04L43/08—Monitoring based on specific metrics
- H04L43/0823—Errors
- H04L43/0829—Packet loss
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance or administration or management of packet switching networks
- H04L41/14—Arrangements for maintenance or administration or management of packet switching networks involving network analysis or design, e.g. simulation, network model or planning
- H04L41/142—Arrangements for maintenance or administration or management of packet switching networks involving network analysis or design, e.g. simulation, network model or planning using statistical or mathematical methods
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/02—Details
- H04L12/26—Monitoring arrangements; Testing arrangements
- H04L12/2602—Monitoring arrangements
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Bhuyan et al. | Network traffic anomaly detection and prevention: concepts, techniques, and tools | |
US11902322B2 (en) | Method, apparatus, and system to map network reachability | |
Bhattacharyya et al. | Network anomaly detection: A machine learning perspective | |
Zarpelão et al. | A survey of intrusion detection in Internet of Things | |
Yan et al. | Software-defined networking (SDN) and distributed denial of service (DDoS) attacks in cloud computing environments: A survey, some research issues, and challenges | |
Chen et al. | Collaborative detection of DDoS attacks over multiple network domains | |
US8020211B2 (en) | Network security system having a device profiler communicatively coupled to a traffic monitor | |
Vaigandla et al. | Investigation on intrusion detection systems (IDSs) in IoT | |
US8108930B2 (en) | Secure self-organizing and self-provisioning anomalous event detection systems | |
Elejla et al. | Intrusion detection systems of ICMPv6-based DDoS attacks | |
Gajewski et al. | Two-tier anomaly detection based on traffic profiling of the home automation system | |
Lyu et al. | A survey on enterprise network security: Asset behavioral monitoring and distributed attack detection | |
Verma et al. | A detailed survey of denial of service for IoT and multimedia systems: Past, present and futuristic development | |
Ahmed et al. | A Systematic Literature Review on Cyber Attack Detection in Software-Define Networking (SDN) | |
Zekrifa | Hybrid Intrusion Detection System | |
Matoušek et al. | Security monitoring of iot communication using flows | |
Bhuyan et al. | Networks and Network Traffic Anomalies | |
Maccari et al. | A Big Data and machine learning approach for network monitoring and security | |
Bhuyan et al. | Network Traa c Anomaly Detection and Prevention | |
KR101045332B1 (en) | IRC and HTPT botnet information sharing system and method | |
La | Security monitoring for network protocols and applications | |
Niemelä | Traffic analysis for intrusion detection in telecommunications networks | |
KR20100075016A (en) | Network based irc and http botnet detect and countermeasure system and method thereof | |
Al-Nashif | Multi-level anomaly based autonomic intrusion detection system | |
Shanmugasundaram et al. | Leveraging Echo State Networks for DDoS Detection in Software-Defined Networking |