Traffic Anomalies
Mostrando 1-6 de 6 artigos, teses e dissertações.
-
1. Uma metodologia para caracterização do tráfego de redes de computadores: uma aplicação em detecção de anomalias / Methodology for traffic characterization of computer networks: an application in anomaly detection
The methods of intrusion detection based on anomalies model the default behavior of network traffic and identify anomalies as deviations from the behavior model mapped. The modeling of traffic behavior requires the analysis of large datasets to extract knowledge about the particularities of each network environment, considering the services provided, number
IBICT - Instituto Brasileiro de Informação em Ciência e Tecnologia. Publicado em: 24/02/2011
-
2. WAVELET-BASED ANOMALY DETECTION IN NETWORK TRAFFIC / UM DETECTOR DE ANOMALIAS DE TRÁFEGO DE REDE BASEADO EM WAVELETS
Attacks on computer networks compromises the security of the system and degrade the performance of the network causing problems to users and organizations. Networkbased Intrusion Detection Systems are used to detect attacks or malicious activity by analyzing the network traffic. The anomaly-based detection approach is used for intrusion detection. It is assu
Publicado em: 2010
-
3. Estudo sobre sistema de detecção de intrusão por anomalias: uma abordagem utilizando redes neurais / Anomaly based intrusion detection system using neural networks
The probability of occurring attacks in computers networks, and as a consequence the emergence of traffic anomalies, increased with the complexity growth of computer networks. The identification, analysis, and treatment of these anomalies in the shortest time possible have become more important and an essential part in network management. The main goal of an
Publicado em: 2008
-
4. WBG (Whois Based Geolocation): uma estratÃgia para localizaÃÃo geogrÃfica de hosts na Internet
By knowing the hostâs geographic location, one can offer several user tailored applications, such as: a) web pages with regional preferences (e.g. an online user may receive selective and directed advertising according to her location or be subject to automatic language selection when displaying content); b) control data availability, according to user geog
Publicado em: 2008
-
5. Application of data mining techniques to TCP/IP network traffic logs analysis / Aplicação de técnicas de data mining para a análise de logs de trafégo TCP/IP
Since the popularization of the Internet in recent years, the amount and variety of computer network services has greatly increased. At the same time new methods to commit crimes using these services appeared, mostly by attempting intrusion or compromising networks. Logging network and application activities through collection and storing of network logs is
Publicado em: 2007
-
6. Detecção de backdoors e canais dissimulados / Detecting backdoors and covert channels
In this work, the decelopment of a backdoor and covert channel detection methodology is presented. The methodololy is divided in three phases: the TPC/IP session s reconstruction, the analysis and classification and the result generation. The first phase propose the use of the TPC/IP Session s Reconstruction System - Recon to perfrm the session s recosntruct
IBICT - Instituto Brasileiro de Informação em Ciência e Tecnologia. Publicado em: 09/12/2005