Anomaly Extraction in Networks
Journal Title: INTERNATIONAL JOURNAL OF COMPUTER TRENDS & TECHNOLOGY - Year 2014, Vol 9, Issue 6
Abstract
The application detects anomaly in network using techniques like histogram, cloning voting, filtering. To extract anomalous flows, one could build a model describing normal flow characteristics and use the model to identify deviating flows. We can compare flows of packets on network with previous flows, like new flows that were not previously observed or flows with significant increase/decrease in their volume. Identify an anomalous flow that combines and consolidates information from multiple histogram-based anomaly detectors [1] [4] [8]. Compared to other possible approaches. Build a histogram based detector that (i) applies histogram cloning[1][4], i.e., maintains multiple randomized histograms to obtain additional views of network traffic[3]; and (ii) uses the Kullback-Leibler (KL) distance to detect anomalies.
Authors and Affiliations
Mr. Naushad Mujawar , Mr. Sohan Patil , Mr. Amit Kanase , Mr. Ravindra Jagadale , Prof. Gajanan Arsalwad
Energy Based Optimal Relaying in Heterogeneous Radio Access Networks
Due to recent trends in mobile communication system, much attention has be given to heterogeneous networks in which a mobile equipment is able to access multiple networks that are present in a locality. Here each random...
Cluster Based Secure Data Broadcast of CLAODV Protocol for MANET
Ad-hoc Networks are using multicast protocol to broadcast the messages. Multicast authentication in ad-hoc networks are very challenging based on below mentioned multiple factors such as nodes have limited computing, ban...
A Survey on Mobility Management Protocols for Improving Handover Performance
The wireless and mobile communication systems have enormous growth in recent years because many people use mobile devices for acquiring different services like browsing, multimedia applications and file sharing etc. Mobi...
Risk Assessment in Online Banking System
With the development of information technology and the popular use of the information network system, the security of the information system becomes particularly important. To ensure the security of the information syste...
An Effective Diffie-Hellman Key Based Intrusion Detection to Secure for Multicast Routing in MANET