Approach to anomaly traffic detection in a local network

被引:0
|
作者
Wang, Xiu-Ying [1 ,2 ]
Xiao, Li-Zhong [2 ,3 ]
Shao, Zhi-Qing [2 ]
机构
[1] Department of Computer Information, Shanghai Xinqiao Vocational and Technical College, Shanghai 200237, China
[2] School of Information Science and Engineering, East China University of Science and Technology, Shanghai 200237, China
[3] Department of Computer Science and Information Engineeting, Shanghai Institute of Technology, Shanghai 200235, China
关键词
Behavioral research;
D O I
暂无
中图分类号
学科分类号
摘要
The research intends to solve the problem of the occupation of bandwidth of local network by abnormal traffic which affects normal user's network behaviors. Firstly, a new algorithm in this paper named danger-theory-based abnormal traffic detection was presented. Then an advanced ID3 algorithm was presented to classify the abnormal traffic. Finally a new model of anomaly traffic detection was built upon the two algorithms above and the detection results were integrated with firewall. The firewall limits the bandwidth based on different types of abnormal traffic. Experiments show the outstanding performance of the proposed approach in real-time property, high detection rate, and unsupervised learning.
引用
收藏
页码:656 / 661
相关论文
共 50 条
  • [1] Approach to Anomaly Traffic Detection in a Local Network
    王秀英
    肖立中
    邵志清
    Journal of Donghua University(English Edition), 2009, 26 (06) : 656 - 661
  • [2] Anomaly detection in network traffic
    Duraj, Agnieszka
    Bucki, Pawel
    Drajling, Aleksander
    Makrocki, Robert
    Sipinski, Mateusz
    PRZEGLAD ELEKTROTECHNICZNY, 2022, 98 (12): : 205 - 208
  • [3] Hubble: An End to End Approach for Anomaly Detection in Network Traffic
    Wang, Shiwei
    Du, Haizhou
    Liu, Lin
    Lin, Zhenyu
    PROCEEDINGS OF THE 2021 IEEE 16TH CONFERENCE ON INDUSTRIAL ELECTRONICS AND APPLICATIONS (ICIEA 2021), 2021, : 516 - 521
  • [4] Anomaly detection in symmetric network traffic
    Yu, Ming
    Zhou, Xi-Yuan
    WSEAS Transactions on Information Science and Applications, 2007, 4 (09): : 1360 - 1364
  • [5] Anomaly detection for network traffic flow
    Shan, Rongsheng
    Li, Jianhua
    Wang, Mingzheng
    Journal of Southeast University (English Edition), 2004, 20 (01) : 16 - 20
  • [6] A Novel Network Traffic Anomaly Detection Approach Using the Optimal φ-DTW
    Zhan, Peng
    Xu, Haoran
    Luo, Wei
    Li, Xueqing
    PROCEEDINGS OF 2020 IEEE 11TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING AND SERVICE SCIENCE (ICSESS 2020), 2020, : 48 - 51
  • [7] Network Traffic Classification for Anomaly Detection Fuzzy Clustering Based Approach
    Asmuss, Julija
    Lauks, Gunars
    2015 12TH INTERNATIONAL CONFERENCE ON FUZZY SYSTEMS AND KNOWLEDGE DISCOVERY (FSKD), 2015, : 313 - 318
  • [8] Hybrid Approach for Detection of Anomaly Network Traffic using Data Mining Techniques
    Agarwal, Basant
    Mittal, Namita
    2ND INTERNATIONAL CONFERENCE ON COMMUNICATION, COMPUTING & SECURITY [ICCCS-2012], 2012, 1 : 996 - 1003
  • [9] Time-frequency analysis and autoencoder approach for network traffic anomaly detection
    Purohit, Ruchira
    Kumar, Satish
    Sayyad, Sameer
    Kotecha, Ketan
    METHODSX, 2025, 14
  • [10] Analysis of network traffic features for anomaly detection
    Iglesias, Felix
    Zseby, Tanja
    MACHINE LEARNING, 2015, 101 (1-3) : 59 - 84