A signal analysis of network traffic anomalies
Proceedings of the 2nd ACM SIGCOMM Workshop on Internet measurment
Detecting DDoS attacks with passive measurement based heuristics
ISCC '04 Proceedings of the Ninth International Symposium on Computers and Communications 2004 Volume 2 (ISCC"04) - Volume 02
An adaptive network intrusion detection method based on PCA and support vector machines
ADMA'05 Proceedings of the First international conference on Advanced Data Mining and Applications
Cache-Conscious collision resolution in string hash tables
SPIRE'05 Proceedings of the 12th international conference on String Processing and Information Retrieval
Hi-index | 0.00 |
This paper presents novel methodology to visualize network traffic. In this paper, methods of transforming network packet header data to image are proposed. These methods can be used for real time anomaly detection and intrusion detection. Images can be processed in a number of ways to extract information from them. This formulation enables techniques from image processing to be applied to the analysis of packet header data to reveal interesting properties of traffic. Network anomaly detection systems can also take help from these processes. These methods can help to detect anomalies in an efficient manner and can be used as the basis of number of new anomaly detection methods. Analysis and comparison of generated images is also presented. Images of network traces are generated using MIT Lincoln Laboratory 1999 DARPA Off-Line Intrusion Detection Evaluation dataset. Our focus here is to develop an innovative technique for network packet header visualization that will highlight the features of the network data most vulnerable to intrusions.