Approach to anomaly traffic detection in a local network

被引:0
|
作者
Wang, Xiu-Ying [1 ,2 ]
Xiao, Li-Zhong [2 ,3 ]
Shao, Zhi-Qing [2 ]
机构
[1] Department of Computer Information, Shanghai Xinqiao Vocational and Technical College, Shanghai 200237, China
[2] School of Information Science and Engineering, East China University of Science and Technology, Shanghai 200237, China
[3] Department of Computer Science and Information Engineeting, Shanghai Institute of Technology, Shanghai 200235, China
关键词
Behavioral research;
D O I
暂无
中图分类号
学科分类号
摘要
The research intends to solve the problem of the occupation of bandwidth of local network by abnormal traffic which affects normal user's network behaviors. Firstly, a new algorithm in this paper named danger-theory-based abnormal traffic detection was presented. Then an advanced ID3 algorithm was presented to classify the abnormal traffic. Finally a new model of anomaly traffic detection was built upon the two algorithms above and the detection results were integrated with firewall. The firewall limits the bandwidth based on different types of abnormal traffic. Experiments show the outstanding performance of the proposed approach in real-time property, high detection rate, and unsupervised learning.
引用
收藏
页码:656 / 661
相关论文
共 50 条
  • [1] Approach to Anomaly Traffic Detection in a Local Network
    王秀英
    肖立中
    邵志清
    [J]. Journal of Donghua University(English Edition), 2009, 26 (06) : 656 - 661
  • [2] Anomaly detection in network traffic
    Duraj, Agnieszka
    Bucki, Pawel
    Drajling, Aleksander
    Makrocki, Robert
    Sipinski, Mateusz
    [J]. PRZEGLAD ELEKTROTECHNICZNY, 2022, 98 (12): : 205 - 208
  • [3] Hubble: An End to End Approach for Anomaly Detection in Network Traffic
    Wang, Shiwei
    Du, Haizhou
    Liu, Lin
    Lin, Zhenyu
    [J]. PROCEEDINGS OF THE 2021 IEEE 16TH CONFERENCE ON INDUSTRIAL ELECTRONICS AND APPLICATIONS (ICIEA 2021), 2021, : 516 - 521
  • [4] Anomaly detection in symmetric network traffic
    Yu, Ming
    Zhou, Xi-Yuan
    [J]. WSEAS Transactions on Information Science and Applications, 2007, 4 (09): : 1360 - 1364
  • [5] Anomaly detection for network traffic flow
    Shan, Rongsheng
    Li, Jianhua
    Wang, Mingzheng
    [J]. Journal of Southeast University (English Edition), 2004, 20 (01) : 16 - 20
  • [6] A Novel Network Traffic Anomaly Detection Approach Using the Optimal φ-DTW
    Zhan, Peng
    Xu, Haoran
    Luo, Wei
    Li, Xueqing
    [J]. PROCEEDINGS OF 2020 IEEE 11TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING AND SERVICE SCIENCE (ICSESS 2020), 2020, : 48 - 51
  • [7] Network Traffic Classification for Anomaly Detection Fuzzy Clustering Based Approach
    Asmuss, Julija
    Lauks, Gunars
    [J]. 2015 12TH INTERNATIONAL CONFERENCE ON FUZZY SYSTEMS AND KNOWLEDGE DISCOVERY (FSKD), 2015, : 313 - 318
  • [8] Hybrid Approach for Detection of Anomaly Network Traffic using Data Mining Techniques
    Agarwal, Basant
    Mittal, Namita
    [J]. 2ND INTERNATIONAL CONFERENCE ON COMMUNICATION, COMPUTING & SECURITY [ICCCS-2012], 2012, 1 : 996 - 1003
  • [9] Network Anomaly Detection based on Traffic Prediction
    Wang, Fengyu
    Gong, Bin
    Hu, Yi
    Zhang, Ningbo
    [J]. 2009 INTERNATIONAL CONFERENCE ON SCALABLE COMPUTING AND COMMUNICATIONS & EIGHTH INTERNATIONAL CONFERENCE ON EMBEDDED COMPUTING, 2009, : 449 - 454
  • [10] Analysis of network traffic features for anomaly detection
    Iglesias, Felix
    Zseby, Tanja
    [J]. MACHINE LEARNING, 2015, 101 (1-3) : 59 - 84