Iterative window size estimation on self-similarity measurement for network traffic anomaly detection
An iterative method for estimating the optimum sample time (or simply window size) in self-similarity measurement of network traffic is introduced. The main purpose of this measurement is to identify anomaly in network traffic. When the network traffic is close to the self-similarity model, it is co...
| Main Authors: | Idris, Mohd. Yazid, Abdullah, Abdul Hanan, Maarof, Mohd. Aizaini |
|---|---|
| Format: | Article |
| Published: |
APCEP-Canada
2004
|
| Subjects: | |
| Online Access: | http://eprints.utm.my/5031/ |
Similar Items
Fast optimization method : the window size and hurst parameter estimator on self-similar network traffic
by: Idris, Mohd. Yazid, et al.
Published: (2007)
by: Idris, Mohd. Yazid, et al.
Published: (2007)
Uncovering anomaly traffic based on loss of self-similarity behavior using second order statistical model
by: Rohani, M. F., et al.
Published: (2007)
by: Rohani, M. F., et al.
Published: (2007)
Comparison of TCP Variants Over Self-Similar Traffic
by: Salleh, Mazleena, et al.
Published: (2005)
by: Salleh, Mazleena, et al.
Published: (2005)
Performance of transmission control protocol on self-similar traffic.
by: Salleh, Mazleena, et al.
Published: (2005)
by: Salleh, Mazleena, et al.
Published: (2005)
Simulating self-similar vbr traffic / Malini Subramaniam
by: Malini, Subramaniam
Published: (2004)
by: Malini, Subramaniam
Published: (2004)
Feature selection using rough-dpso in anomaly intrusion detection
by: Zainal, Anazida, et al.
Published: (2007)
by: Zainal, Anazida, et al.
Published: (2007)
Traffic Scene Anomaly Detection
by: Lu, Cai An
Published: (2017)
by: Lu, Cai An
Published: (2017)
Feature selection using Rough-DPSO in anomaly intrusion detection
by: Zainal, Anazida, et al.
Published: (2007)
by: Zainal, Anazida, et al.
Published: (2007)
Self-similar network traffic using Successive Random Addition (SRA) algorithm / Hani Hamira Harun
by: Harun, Hani Hamira
Published: (2006)
by: Harun, Hani Hamira
Published: (2006)
Self-similar network traffic using Random Midpoint Displacement (RMD) algorithm / Jumaliah Saarini
by: Saarini, Jumaliah
Published: (2006)
by: Saarini, Jumaliah
Published: (2006)
Modified key size determination models for symmetric ciphers
by: Ibrahim, Subariah, et al.
Published: (2005)
by: Ibrahim, Subariah, et al.
Published: (2005)
Symmetric Key Size for Different Level of Information Classification
by: Ibrahim, Subariah, et al.
Published: (2006)
by: Ibrahim, Subariah, et al.
Published: (2006)
An iterative approach to enhanced traffic signal optimization
by: WONG, Y, et al.
Published: (2008)
by: WONG, Y, et al.
Published: (2008)
Generation of self similar network traffic using DFGN algorithm / Che Ku Noreymie Che Ku Jusoh
by: Che Ku Jusoh, Che Ku Noreymie
Published: (2006)
by: Che Ku Jusoh, Che Ku Noreymie
Published: (2006)
Analysis of malicious traffic and its impact to QoS metric LRD and energy invariant
by: Rohani, Mohd. Fo'ad, et al.
Published: (2006)
by: Rohani, Mohd. Fo'ad, et al.
Published: (2006)
Unsupervised Anomaly Detection with Unlabeled Data Using Clustering
by: Chimphlee, Witcha, et al.
Published: (2005)
by: Chimphlee, Witcha, et al.
Published: (2005)
Collaborative Filtering Similarity Measures: Revisiting
by: Al-Bashiri, Hael, et al.
Published: (2017)
by: Al-Bashiri, Hael, et al.
Published: (2017)
Iterative structures
by: Shah, Asadullah, et al.
Published: (2011)
by: Shah, Asadullah, et al.
Published: (2011)
Selection of Window Size for Focus Measure Processing
by: Malik, Aamir Saeed
Published: (2010)
by: Malik, Aamir Saeed
Published: (2010)
Requirements analysis for SBS system and study review process iteration during requirements phase
by: Alghamdi, Hanan Musafer H.
Published: (2009)
by: Alghamdi, Hanan Musafer H.
Published: (2009)
To identify suspicious activity in anomaly detection based on soft computing
by: Chimphlee, Witcha, et al.
Published: (2006)
by: Chimphlee, Witcha, et al.
Published: (2006)
Integrating genetic algorithms and fuzzy c-means for anomaly detection
by: Chimphlee, Witcha, et al.
Published: (2005)
by: Chimphlee, Witcha, et al.
Published: (2005)
Data-Driven Similarity Measures for Matrimonial Application
by: Chia, Yong Fang
Published: (2020)
by: Chia, Yong Fang
Published: (2020)
Anomaly detection of intrusion based on integration of rough sets and fuzzy c-means
by: Chimphlee, Witcha, et al.
Published: (2005)
by: Chimphlee, Witcha, et al.
Published: (2005)
Anomaly-based intrusion detection using fuzzy rough clustering
by: Chimphlee, Witcha, et al.
Published: (2006)
by: Chimphlee, Witcha, et al.
Published: (2006)
Windows explorer
by: Shah, Asadullah, et al.
Published: (2011)
by: Shah, Asadullah, et al.
Published: (2011)
Windows installation
by: Shah, Asadullah, et al.
Published: (2011)
by: Shah, Asadullah, et al.
Published: (2011)
Comparison of retrieval schemes based on different structure and similarity measures for Malaysia's fatwa
by: Ibrahim, Mohd. Nazri
Published: (2007)
by: Ibrahim, Mohd. Nazri
Published: (2007)
Review of iterative structures
by: Shah, Asadullah, et al.
Published: (2011)
by: Shah, Asadullah, et al.
Published: (2011)
Real valued negative selection for anomaly detection in wireless ad hoc networks
by: Abdul Majid, Azri, et al.
Published: (2004)
by: Abdul Majid, Azri, et al.
Published: (2004)
Anomaly network intrusion detection method in network security based on principle component analysis
by: Chimphlee, Witcha, et al.
Published: (2006)
by: Chimphlee, Witcha, et al.
Published: (2006)
Benchmarking of halal food products using similarity measures – a conceptual retrieval model
by: Mohd Tamrin, Mohd Izzuddin, et al.
Published: (2019)
by: Mohd Tamrin, Mohd Izzuddin, et al.
Published: (2019)
Fusion of similarity measures using genetic algorithm for searching chemical database
by: Rahman Ali, Yahya Ali Abdel
Published: (2007)
by: Rahman Ali, Yahya Ali Abdel
Published: (2007)
Similarity measure for retrieval of question items with multi-variable data sets
by: Che Hassan, Siti Hasrinafasya
Published: (2008)
by: Che Hassan, Siti Hasrinafasya
Published: (2008)
Window size and round-trip-time in a network transmission session
by: Ibrahim, Adamu Abubakar, et al.
Published: (2018)
by: Ibrahim, Adamu Abubakar, et al.
Published: (2018)
Digital forensic investigation reduction model (DIFReM) for Windows 10 OS
by: Shayau, Yazid Haruna
Published: (2018)
by: Shayau, Yazid Haruna
Published: (2018)
Evaluating keyphrase extraction algorithms for finding similar news articles using lexical similarity calculation and semantic relatedness measurement by word embedding
by: Sarwar, Talha, et al.
Published: (2022)
by: Sarwar, Talha, et al.
Published: (2022)
Spatial query retrieval model by single measure similarity (SMSS)
by: Lau, Bee Theng
Published: (2006)
by: Lau, Bee Theng
Published: (2006)
Diffusion analysis of EFN-MDS structure
by: Ibrahim, Subariah, et al.
Published: (2006)
by: Ibrahim, Subariah, et al.
Published: (2006)
A Review on Biological Inspired Computation in Cryptology
by: Ibrahim, Subariah, et al.
Published: (2005)
by: Ibrahim, Subariah, et al.
Published: (2005)
Similar Items
-
Fast optimization method : the window size and hurst parameter estimator on self-similar network traffic
by: Idris, Mohd. Yazid, et al.
Published: (2007) -
Uncovering anomaly traffic based on loss of self-similarity behavior using second order statistical model
by: Rohani, M. F., et al.
Published: (2007) -
Comparison of TCP Variants Over Self-Similar Traffic
by: Salleh, Mazleena, et al.
Published: (2005) -
Performance of transmission control protocol on self-similar traffic.
by: Salleh, Mazleena, et al.
Published: (2005) -
Simulating self-similar vbr traffic / Malini Subramaniam
by: Malini, Subramaniam
Published: (2004)