Uncovering anomaly traffic based on loss of self-similarity behavior using second order statistical model
Malicious traffic such as Denial of Service (DoS) attack has potential to introduce distribution error and perturbs the self-similarity property of network traffic. As a result, loss of self-similarity (LoSS) is detected which indicates poor Quality of Service (QoS) performance. In order to fulfill...
| Main Authors: | Rohani, M. F., Maarof, M. A., Selamat, A., Kettani, H. |
|---|---|
| Format: | Article |
| Published: |
International Journal of Computer Science and Network Security
2007
|
| Subjects: | |
| Online Access: | http://eprints.utm.my/5602/ |
Similar Items
Iterative window size estimation on self-similarity measurement for network traffic anomaly detection
by: Idris, Mohd. Yazid, et al.
Published: (2004)
by: Idris, Mohd. Yazid, et al.
Published: (2004)
An implementation of LoSS detection using SOSS model
by: Rohani, M.F, et al.
Published: (2007)
by: Rohani, M.F, et al.
Published: (2007)
Traffic Scene Anomaly Detection
by: Lu, Cai An
Published: (2017)
by: Lu, Cai An
Published: (2017)
Fast optimization method : the window size and hurst parameter estimator on self-similar network traffic
by: Idris, Mohd. Yazid, et al.
Published: (2007)
by: Idris, Mohd. Yazid, et al.
Published: (2007)
Comparison of TCP Variants Over Self-Similar Traffic
by: Salleh, Mazleena, et al.
Published: (2005)
by: Salleh, Mazleena, et al.
Published: (2005)
Performance of transmission control protocol on self-similar traffic.
by: Salleh, Mazleena, et al.
Published: (2005)
by: Salleh, Mazleena, et al.
Published: (2005)
Simulating self-similar vbr traffic / Malini Subramaniam
by: Malini, Subramaniam
Published: (2004)
by: Malini, Subramaniam
Published: (2004)
An integrated anomaly intrusion detection scheme using statistical, hybridized classifiers and signature approach
by: Mohamed Yassin, Warusia
Published: (2015)
by: Mohamed Yassin, Warusia
Published: (2015)
Analysis of malicious traffic and its impact to QoS metric LRD and energy invariant
by: Rohani, Mohd. Fo'ad, et al.
Published: (2006)
by: Rohani, Mohd. Fo'ad, et al.
Published: (2006)
Self-similar network traffic using Successive Random Addition (SRA) algorithm / Hani Hamira Harun
by: Harun, Hani Hamira
Published: (2006)
by: Harun, Hani Hamira
Published: (2006)
Self-similar network traffic using Random Midpoint Displacement (RMD) algorithm / Jumaliah Saarini
by: Saarini, Jumaliah
Published: (2006)
by: Saarini, Jumaliah
Published: (2006)
Generation of self similar network traffic using DFGN algorithm / Che Ku Noreymie Che Ku Jusoh
by: Che Ku Jusoh, Che Ku Noreymie
Published: (2006)
by: Che Ku Jusoh, Che Ku Noreymie
Published: (2006)
Feature selection using rough-dpso in anomaly intrusion detection
by: Zainal, Anazida, et al.
Published: (2007)
by: Zainal, Anazida, et al.
Published: (2007)
Unsupervised monocular depth estimation with multi-scale structural similarity powered loss function / Ali Kohan
by: Ali, Kohan
Published: (2020)
by: Ali, Kohan
Published: (2020)
Reducing real-time traffic packet loss in mobile IPv6 using two tier buffer
by: M. Zaki, Salim
Published: (2008)
by: M. Zaki, Salim
Published: (2008)
Feature selection using Rough-DPSO in anomaly intrusion detection
by: Zainal, Anazida, et al.
Published: (2007)
by: Zainal, Anazida, et al.
Published: (2007)
Sigmoid function implementation using the unequal segmentation of differential lookup table and second order nonlinear function
by: Syahrulanuar, Ngah, et al.
Published: (2017)
by: Syahrulanuar, Ngah, et al.
Published: (2017)
Identification of vessel anomaly behavior using support vector machines and Bayesian networks
by: Dwi Handayani, Dini Oktarina, et al.
Published: (2014)
by: Dwi Handayani, Dini Oktarina, et al.
Published: (2014)
Uncovering Relationship between Sleep Disorder and Lifestyle using Predictive Analytics
by: Ying, Sham Fang, et al.
Published: (2022)
by: Ying, Sham Fang, et al.
Published: (2022)
Anomaly-based intrusion detection using fuzzy rough clustering
by: Chimphlee, Witcha, et al.
Published: (2006)
by: Chimphlee, Witcha, et al.
Published: (2006)
Second Order Partial Derivatives Estimation Using a Modification of the Lagrange Quadratic Interpolant
by: Ooi, Y., et al.
Published: (2005)
by: Ooi, Y., et al.
Published: (2005)
Measuring Website Usability Construct as Second Order Construct in Website Usability Model
by: Nur Sukinah, Aziz, et al.
Published: (2018)
by: Nur Sukinah, Aziz, et al.
Published: (2018)
To identify suspicious activity in anomaly detection based on soft computing
by: Chimphlee, Witcha, et al.
Published: (2006)
by: Chimphlee, Witcha, et al.
Published: (2006)
Similarity Segmentation Approach For Sensor-Based Human Activity Recognition
by: Baraka, Abdulrahman M. A.
Published: (2024)
by: Baraka, Abdulrahman M. A.
Published: (2024)
Security testing of web applications for detecting and removing second-order SQL injection vulnerabilities
by: Draib, Najla'a Ateeq Mohammed
Published: (2022)
by: Draib, Najla'a Ateeq Mohammed
Published: (2022)
Modeling and performance evaluation of self-similar behavior of MPEG-4 video traffic generators
by: Mohamed Abdelaziz, Izzeldin Ibrahim
Published: (2006)
by: Mohamed Abdelaziz, Izzeldin Ibrahim
Published: (2006)
Conceptualizing and Validating Information Security Culture as a Multidimensional Second-Order Formative Construct
by: Nasir, Akhyari, et al.
Published: (2018)
by: Nasir, Akhyari, et al.
Published: (2018)
Unsupervised Anomaly Detection with Unlabeled Data Using Clustering
by: Chimphlee, Witcha, et al.
Published: (2005)
by: Chimphlee, Witcha, et al.
Published: (2005)
Enhanced Techniques For Detection And Classification Of Neighbor Discovery Protocol Anomalies
by: Firas (M.H.) S., Najjar
Published: (2016)
by: Firas (M.H.) S., Najjar
Published: (2016)
Enhanced Statistical Modelling For Variable Bit Rate Video Traffic Generated From Scalable Video Codec
by: Ahmadpour, Sima
Published: (2016)
by: Ahmadpour, Sima
Published: (2016)
Integrating genetic algorithms and fuzzy c-means for anomaly detection
by: Chimphlee, Witcha, et al.
Published: (2005)
by: Chimphlee, Witcha, et al.
Published: (2005)
Paraphrase Detection using String Similarity with Synonyms
by: Lee, Jun Choi, et al.
Published: (2015)
by: Lee, Jun Choi, et al.
Published: (2015)
The study of probability model for compound similarity searching
by: Salim, Naomie, et al.
Published: (2006)
by: Salim, Naomie, et al.
Published: (2006)
Image retrieval based on similarity score fusion
by: Mohd. Ali, Iliana
Published: (2007)
by: Mohd. Ali, Iliana
Published: (2007)
Inference networks for molecular database similarity searching
by: Abdo, Ammar, et al.
Published: (2008)
by: Abdo, Ammar, et al.
Published: (2008)
Testing of linear models for optimal control of second-order
dynamical system based on model-reality differences
by: Kek, Sie Long, et al.
Published: (2021)
by: Kek, Sie Long, et al.
Published: (2021)
Solutions of a class of singular second-order IVPs by homotopy-perturbation method
by: Chowdhury, Md. Sazzad Hossien, et al.
Published: (2007)
by: Chowdhury, Md. Sazzad Hossien, et al.
Published: (2007)
Identification of ECG anomalies through deep deterministic learning / Uzair Iqbal
by: Uzair , Iqbal
Published: (2020)
by: Uzair , Iqbal
Published: (2020)
An optimized feature set for anomaly-based intrusion detection / Wasswa Hassan
by: Wasswa, Hassan
Published: (2019)
by: Wasswa, Hassan
Published: (2019)
Packet header anomaly detection using statistical analysis
by: Yassin, Warusia, et al.
Published: (2014)
by: Yassin, Warusia, et al.
Published: (2014)
Similar Items
-
Iterative window size estimation on self-similarity measurement for network traffic anomaly detection
by: Idris, Mohd. Yazid, et al.
Published: (2004) -
An implementation of LoSS detection using SOSS model
by: Rohani, M.F, et al.
Published: (2007) -
Traffic Scene Anomaly Detection
by: Lu, Cai An
Published: (2017) -
Fast optimization method : the window size and hurst parameter estimator on self-similar network traffic
by: Idris, Mohd. Yazid, et al.
Published: (2007) -
Comparison of TCP Variants Over Self-Similar Traffic
by: Salleh, Mazleena, et al.
Published: (2005)