Anomaly Extraction in Networks

Journal Title: INTERNATIONAL JOURNAL OF COMPUTER TRENDS & TECHNOLOGY - Year 2014, Vol 9, Issue 6

Abstract

The application detects anomaly in network using techniques like histogram, cloning voting, filtering. To extract anomalous flows, one could build a model describing normal flow characteristics and use the model to identify deviating flows. We can compare flows of packets on network with previous flows, like new flows that were not previously observed or flows with significant increase/decrease in their volume. Identify an anomalous flow that combines and consolidates information from multiple histogram-based anomaly detectors [1] [4] [8]. Compared to other possible approaches. Build a histogram based detector that (i) applies histogram cloning[1][4], i.e., maintains multiple randomized histograms to obtain additional views of network traffic[3]; and (ii) uses the Kullback-Leibler (KL) distance to detect anomalies.

Authors and Affiliations

Mr. Naushad Mujawar , Mr. Sohan Patil , Mr. Amit Kanase , Mr. Ravindra Jagadale , Prof. Gajanan Arsalwad

Keywords

Related Articles

Energy Based Optimal Relaying in Heterogeneous Radio Access Networks

Due to recent trends in mobile communication system, much attention has be given to heterogeneous networks in which a mobile equipment is able to access multiple networks that are present in a locality. Here each random...

Cluster Based Secure Data Broadcast of CLAODV Protocol for MANET

Ad-hoc Networks are using multicast protocol to broadcast the messages. Multicast authentication in ad-hoc networks are very challenging based on below mentioned multiple factors such as nodes have limited computing, ban...

A Survey on Mobility Management Protocols for Improving Handover Performance

The wireless and mobile communication systems have enormous growth in recent years because many people use mobile devices for acquiring different services like browsing, multimedia applications and file sharing etc. Mobi...

Risk Assessment in Online Banking System

With the development of information technology and the popular use of the information network system, the security of the information system becomes particularly important. To ensure the security of the information syste...

Download PDF file
  • EP ID EP162721
  • DOI -
  • Views 108
  • Downloads 0

How To Cite

Mr. Naushad Mujawar, Mr. Sohan Patil, Mr. Amit Kanase, Mr. Ravindra Jagadale, Prof. Gajanan Arsalwad (2014). Anomaly Extraction in Networks. INTERNATIONAL JOURNAL OF COMPUTER TRENDS & TECHNOLOGY, 9(6), 327-330. https://europub.co.uk/articles/-A-162721