Dynamic modeling of internet traffic for intrusion detection
From MaRDI portal
Publication:838848
DOI10.1155/2007/90312zbMATH Open1168.68334OpenAlexW2104774115MaRDI QIDQ838848FDOQ838848
Authors: Khushboo Shah, Edmond Jonckheere, Stephan Bohacek
Publication date: 1 September 2009
Published in: EURASIP Journal on Advances in Signal Processing (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1155/2007/90312
Recommendations
- Detection of intrusions in information systems by sequential change-point methods
- Network statistics in function of statistical intrusion detection
- Detection of variations of local irregularity of traffic under DDOS flood attack
- Network traffic anomaly detection based on flow feature
- Network anomaly detection based on wavelet analysis
Communication networks in operations research (90B18) Network design and communication in computer systems (68M10)
Cites Work
- Estimating Optimal Transformations for Multiple Regression and Correlation
- THE COMPLEXITY OF FINITE OBJECTS AND THE DEVELOPMENT OF THE CONCEPTS OF INFORMATION AND RANDOMNESS BY MEANS OF THE THEORY OF ALGORITHMS
- Markovian Representation of Stochastic Processes by Canonical Variables
- Minimum Message Length and Kolmogorov Complexity
- Complexity distortion theory
- Power spectrum reduction by optimal Hankel norm approximation of the phase of the outer spectral factor
- Decay of correlations for the automorphism of the torus
Cited In (8)
- Detection of HTTP-GET attack with clustering and information theoretic measurements
- Detecting network intrusions using signal processing with query-based sampling filter
- Network statistics in function of statistical intrusion detection
- Algorithmic Applications in Management
- A diffusion model of roundtrip time
- Detection of variations of local irregularity of traffic under DDOS flood attack
- ANOMALY DETECTION IN DISTRIBUTED COMPUTER COMMUNICATION SYSTEMS
- Detection of Information Flows
This page was built for publication: Dynamic modeling of internet traffic for intrusion detection
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q838848)