Anomaly Extraction in Networks

Journal Title: INTERNATIONAL JOURNAL OF COMPUTER TRENDS & TECHNOLOGY - Year 2014, Vol 9, Issue 6

Abstract

The application detects anomaly in network using techniques like histogram, cloning voting, filtering. To extract anomalous flows, one could build a model describing normal flow characteristics and use the model to identify deviating flows. We can compare flows of packets on network with previous flows, like new flows that were not previously observed or flows with significant increase/decrease in their volume. Identify an anomalous flow that combines and consolidates information from multiple histogram-based anomaly detectors [1] [4] [8]. Compared to other possible approaches. Build a histogram based detector that (i) applies histogram cloning[1][4], i.e., maintains multiple randomized histograms to obtain additional views of network traffic[3]; and (ii) uses the Kullback-Leibler (KL) distance to detect anomalies.

Authors and Affiliations

Mr. Naushad Mujawar , Mr. Sohan Patil , Mr. Amit Kanase , Mr. Ravindra Jagadale , Prof. Gajanan Arsalwad

Keywords

Related Articles

A Procedural Performance Comparison of Soft Thresholding Techniques for Medical Image Denoising

It is still a challenging problem for researchers to remove noise from medical image. To remove Noise from the images is not easy. Several algorithms are published and each approach has its advantages, and limitations. T...

Survey on Sparse Coded Features for Content Based Face Image Retrieval

Content based image retrieval, a technique which uses visual contents of image to search images from large scale image databases according to users' interests. This paper provides a comprehensive survey on recent technol...

Enhancing Rural Development in Tamilnadu through ICT: An Evaluation of Latest Technologies in the scheme MGNREGS

When e-governance indicates better governance, naturally, rural development becomes an essential part of it. It is so because developing countries like India depend on the villages and their welfare. Keeping this in mind...

Image Search Reranking

The existing methods for image search re ranking suffer from the unfaithfulness of the as sumptions under which the text-based images search result. The resulting images contain more irrelevant images. Hence the re ranki...

Download PDF file
  • EP ID EP162721
  • DOI -
  • Views 117
  • Downloads 0

How To Cite

Mr. Naushad Mujawar, Mr. Sohan Patil, Mr. Amit Kanase, Mr. Ravindra Jagadale, Prof. Gajanan Arsalwad (2014). Anomaly Extraction in Networks. INTERNATIONAL JOURNAL OF COMPUTER TRENDS & TECHNOLOGY, 9(6), 327-330. https://europub.co.uk/articles/-A-162721