Anomaly Extraction in Networks
Journal Title: INTERNATIONAL JOURNAL OF COMPUTER TRENDS & TECHNOLOGY - Year 2014, Vol 9, Issue 6
Abstract
The application detects anomaly in network using techniques like histogram, cloning voting, filtering. To extract anomalous flows, one could build a model describing normal flow characteristics and use the model to identify deviating flows. We can compare flows of packets on network with previous flows, like new flows that were not previously observed or flows with significant increase/decrease in their volume. Identify an anomalous flow that combines and consolidates information from multiple histogram-based anomaly detectors [1] [4] [8]. Compared to other possible approaches. Build a histogram based detector that (i) applies histogram cloning[1][4], i.e., maintains multiple randomized histograms to obtain additional views of network traffic[3]; and (ii) uses the Kullback-Leibler (KL) distance to detect anomalies.
Authors and Affiliations
Mr. Naushad Mujawar , Mr. Sohan Patil , Mr. Amit Kanase , Mr. Ravindra Jagadale , Prof. Gajanan Arsalwad
A New Web Based Student Annual Review Information System (SARIS) With Student Success Prediction
In this paper, we are proposing new web based Student Annual Review Information System (SARIS) and prediction method for the success of scholar students to China Scholarship Council(CSC). The main objective of developing...
Advanced Vehicle Tracking System on Google Earth Using GPS and GSM
Vehicle navigation is one of the most important applications in the era of navigation which is mostly used by drivers. Therefore the efficiency of the maps given to the drivers has a great importance in the navigation sy...
Proficient And Protected Content Dispensation In Distributed Environment To Client Proxy-Based Transcoding Approach
Currently internet client varies widely both in hardware and software properties. The ever increasing requirements of clients to support heterogeneous environment, demand techniques to adapt the same content to diverse d...
A Novel Routing Protocol for Providing Anonymity in MANET
Mobile Ad Hoc Networks (MANETs) using anonymous routing protocols hidden node identity and external routes having anonymity protection. Anonymous routing protocols use either hop-by-by hop encryption or redundant traffic...
Performance Enhancement in Power aware Ad hoc Routing using Highly Probable Link
In today’s fast-moving world connectivity is the biggest trend to look out for and connecting devices with varying specifications is not a simple task. This becomes more of a problem in an environment where all devices,...