urlnsa.blogg.se

Networking projects list
Networking projects list












networking projects list networking projects list

Once an anomaly has been detected, the operator can further investigate which specific flows are anomalous by running the CE-based algorithm. The two algorithms complement each other and allow the network operator to first activate the flow aggregation algorithm in order to quickly detect anomalies in the system. The second algorithm performs anomaly detection via GLRT on the aggregated flows transformation-a compact low-dimensional representation of the raw traffic flows. The first is based on the cross entropy (CE) method, which detects anomalies as well as attributes anomalies to flows. We then develop two low-complexity anomaly detec-tion algorithms. This results in a combinatorial optimization problem which is prohibitively expensive. We first formulate the optimal anomaly detection problem via the generalized likelihood ratio test (GLRT) for our composite model. To this end, we develop a new statistical decision theoretic framework for temporally correlated traffic in networks via Markov chain modeling. In this paper, we address the problem of not only detecting the anomalous events but also of attributing the anomaly to the flows causing it. Abstract: Anomaly detection in communication networks is the first step in the challenging task of securing a network, as anomalies may indicate suspicious behaviors, attacks, network malfunctions, or failures.














Networking projects list