Anomaly Extraction in Networks

Journal Title: INTERNATIONAL JOURNAL OF COMPUTER TRENDS & TECHNOLOGY - Year 2014, Vol 9, Issue 6

Abstract

The application detects anomaly in network using techniques like histogram, cloning voting, filtering. To extract anomalous flows, one could build a model describing normal flow characteristics and use the model to identify deviating flows. We can compare flows of packets on network with previous flows, like new flows that were not previously observed or flows with significant increase/decrease in their volume. Identify an anomalous flow that combines and consolidates information from multiple histogram-based anomaly detectors [1] [4] [8]. Compared to other possible approaches. Build a histogram based detector that (i) applies histogram cloning[1][4], i.e., maintains multiple randomized histograms to obtain additional views of network traffic[3]; and (ii) uses the Kullback-Leibler (KL) distance to detect anomalies.

Authors and Affiliations

Mr. Naushad Mujawar , Mr. Sohan Patil , Mr. Amit Kanase , Mr. Ravindra Jagadale , Prof. Gajanan Arsalwad

Keywords

Related Articles

MIMO Schemes With Spatial Modulation in Wireless Communication

The combination of spatial modulation (SM) and space-time block coding (STBC) provides more advantages than other modulation techniques. In the MA-SM system, the transmitted symbols are mapped into a high dimensional con...

Enhancing Detection Rate in Selfish Attack Detection Scheme in Cognitive Radio Adhoc Networks

Cognitive radio (CR) is a significant communication technology in which the unlicensed users use the maximum available bandwidth. When the spectrum is not used by the licensed primary user, the obtainable channels are al...

Analysis of Email Fraud Detection Using WEKA Tool

Data mining is also being useful to give solutions for invasion finding and auditing. While data mining has several applications in protection, there are also serious privacy fears. Because of email mining, even inexperi...

Cluster Based Secure Data Broadcast of CLAODV Protocol for MANET

Ad-hoc Networks are using multicast protocol to broadcast the messages. Multicast authentication in ad-hoc networks are very challenging based on below mentioned multiple factors such as nodes have limited computing, ban...

Data Acquisition and Reduction Algorithm for Shearing Interferometer Based Long Trace Profilometer

The Long Trace Profilometer (LTP) is a non-contact optical profiling instrument, designed to measure the absolute surface figure to nanometer accuracy of long strip flat, spherical and aspherical X-ray optics of up to 12...

Download PDF file
  • EP ID EP162721
  • DOI -
  • Views 114
  • Downloads 0

How To Cite

Mr. Naushad Mujawar, Mr. Sohan Patil, Mr. Amit Kanase, Mr. Ravindra Jagadale, Prof. Gajanan Arsalwad (2014). Anomaly Extraction in Networks. INTERNATIONAL JOURNAL OF COMPUTER TRENDS & TECHNOLOGY, 9(6), 327-330. https://europub.co.uk/articles/-A-162721