Computer Networks: The International Journal of Computer and Telecommunications Networking
Mining anomalies using traffic feature distributions
Proceedings of the 2005 conference on Applications, technologies, architectures, and protocols for computer communications
Histogram-based traffic anomaly detection
IEEE Transactions on Network and Service Management
A survey of internet worm detection and containment
IEEE Communications Surveys & Tutorials
Introduction to Computer Networks and Cybersecurity
Introduction to Computer Networks and Cybersecurity
Hi-index | 0.00 |
Network traffic anomaly detection is now considered a surer approach to early detection of malware than signature-based approaches and is best accomplished with traffic data collected from multiple locations. Existing open-source tools are primarily signature-based, or do not facilitate integration of traffic data from multiple locations for real-time analysis, or are insufficiently modular for incorporation of newly proposed approaches to anomaly detection. In this paper, we describe DataMap, a new modular open-source tool for the collection and real-time analysis of sampled, anonymized, and filtered traffic data from multiple WiFi locations in a network and an example of its use in anomaly detection.