STATISTICAL TECHNIQUES FOR DETECTING TRAFFIC ANOMALIES THROUGH PACKET HEADER DATA
#1

STATISTICAL TECHNIQUES FOR DETECTING TRAFFIC ANOMALIES THROUGH PACKET HEADER DATA
Abstract: THE frequent attacks on network infrastructure, using various forms of denial of service (DoS) attacks and worms, have led to an increased need for developing techniques for analyzing and monitoring network traffic. If efficient analysis tools were available, it could become possible to detect the attacks, anomalies and take action to suppress them before they have had much time to propagate across the network. In this paper, we study the possibilities of traffic-analysis based mechanisms for attack and anomaly detection. The motivation for this work came from a need to reduce the likelihood that an attacker may hijack the campus machines to stage an attack on a third party. A campus may want to prevent or limit misuse of its machines in staging attacks, and possibly limit the liability from such attacks. In particular, we study the utility of observing packet header data of outgoing traffic, such as destination addresses, port numbers and the number of flows, in order to detect attacks/anomalies originating from the campus at the edge of a campus. Detecting anomalies/attacks close to the source allows us to limit the potential damage close to the attacking machines. Traffic monitoring close to the source may enable the network operator quicker identification of potential anomalies and allow better control of administrative domainâ„¢s resources. Attack propagation could be slowed through early detection. Our approach passively monitors network traffic at regular intervals and analyzes it to find any abnormalities in the aggregated traffic. By observing the traffic and correlating it to previous states of traffic, it may be possible to see whether the current traffic is behaving in a similar (i.e., correlated) manner. The network traffic could look different because of flash crowds, changing access patterns, infrastructure problems such as router failures, and DoS attacks. In the case of bandwidth attacks, the usage of network may be increased and abnormalities may show up in traffic volume. Flash crowds could be observed through sudden increase in traffic volume to a single destination. Sudden increase of traffic on a certain port could signify the onset of an anomaly such as worm propagation. Our approach relies on analyzing packet header data in order to provide indications of
Possible abnormalities in the traffic.
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: statistical tools for performance apprasial, atmel89s52 iar header, statistical quality control doc, seminar report of detecting and resolving firewall policy anomalies, header file for at89c51 download, tcp header, ipv6 header,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  ROBUST DWT-SVD DOMAIN IMAGE WATERMARKING: EMBEDDING DATA IN ALL FREQUENCIES computer science crazy 2 5,217 19-06-2018, 06:10 PM
Last Post: KavyaIyengar
  ULTRASONIC TECHNIQUES FOR HIDDEN CORROSION DETECTION IN AIRCRAFT WING SKIN smart paper boy 2 3,094 13-04-2017, 03:53 PM
Last Post: jaseela123d
  Brain Tumour Detection Using Water shedding and basic Image Processing Techniques smart paper boy 2 3,073 01-08-2015, 02:53 PM
Last Post: seminar report asees
  AUTOMATED TRAFFIC SIGNAL CONTROLLER full report project topics 7 10,287 02-09-2013, 10:40 PM
Last Post: Guest
  wireless-data-communication-infrared-led seminar class 4 3,320 31-07-2013, 10:16 AM
Last Post: computer topic
  Density Based Traffic Light Control System seminar class 7 8,136 03-06-2013, 02:16 PM
Last Post: Guest
  Secured Data Transmission through Network seminar surveyer 2 2,318 26-04-2013, 02:02 PM
Last Post: computer topic
  INTELLIGENT AMBULANCE FOR TRAFFIC POLICE full report project report tiger 10 9,991 09-02-2013, 03:49 PM
Last Post: nkmas
  Wirelesss Data Encryptiion and Decryption using RF Communication project topics 17 11,432 03-02-2013, 10:30 PM
Last Post: mohanece401
  IMAGE ENHANCEMENT TECHNIQUES USING FREQUENCY DOMAIN FILTERING project report tiger 1 6,281 18-01-2013, 04:45 PM
Last Post: Guest

Forum Jump: