Open Access Open Access  Restricted Access Subscription Access

Review of Anomaly Detection based on Classifying Frequent Traffic Patterns


Affiliations
1 RGPV, IES College of Technology, Bhopal(M.P.), India
 

As internet grow rapidly and numerous applications use it as a larger communication media. Many organizations are Internet dependent for their working methodology. This will lead a larger amount of network traffic. Network traffic anomaly is kind of status that the traffic activities deviated from its normal condition behaviors. The characteristic of network traffic anomaly is that it explodes unexpectedly without any warning. It will lead immense damage to networks and network apparatus in a minimum time. Detection of network traffic anomalies is vital for network operators as it facilitates to classify security incidents and to observe the availability of network related services. In this paper we are going to present various methods or schemes for anomaly detection. In this paper we also focus on various schemes that are applicable to enhance the network performance.
User
Notifications
Font Size

Abstract Views: 114

PDF Views: 0




  • Review of Anomaly Detection based on Classifying Frequent Traffic Patterns

Abstract Views: 114  |  PDF Views: 0

Authors

Mayank Nagar
RGPV, IES College of Technology, Bhopal(M.P.), India
Sandeep Kumar
RGPV, IES College of Technology, Bhopal(M.P.), India
Udaypal Reddy
RGPV, IES College of Technology, Bhopal(M.P.), India

Abstract


As internet grow rapidly and numerous applications use it as a larger communication media. Many organizations are Internet dependent for their working methodology. This will lead a larger amount of network traffic. Network traffic anomaly is kind of status that the traffic activities deviated from its normal condition behaviors. The characteristic of network traffic anomaly is that it explodes unexpectedly without any warning. It will lead immense damage to networks and network apparatus in a minimum time. Detection of network traffic anomalies is vital for network operators as it facilitates to classify security incidents and to observe the availability of network related services. In this paper we are going to present various methods or schemes for anomaly detection. In this paper we also focus on various schemes that are applicable to enhance the network performance.