Skip to main content

Automatic Location Detection System for Anomaly Traffic on Wired/Wireless Networks

  • Conference paper
Computational Science and Its Applications - ICCSA 2006 (ICCSA 2006)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 3981))

Included in the following conference series:

  • 637 Accesses

Abstract

As use of Internet has grown, wired/wireless network backbone and access network has speed up, network environment get composed complexity. Recently network fault is often happened by worm virus, and then the major reason is anomaly traffic flowed from host inside rather than attack from outside. In this paper, using monitoring the load of network node and detecting abnormally signs about anomaly traffic, we try to design and implement automatic system which can trace the location for the affected system.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Cáceres, R.: Measurements of wide-area Internet traffic. Tech. Rep. UCB/CSD 89/550, Computer Science Department, University of California, Berkeley (1989)

    Google Scholar 

  2. Paxon, V.: Fast, approximate synthesis of fractional Gaussian noise for generating self-similar network traffic. Computer Communications Review, vol. 27(5) (1997)

    Google Scholar 

  3. Paxson, V.: Measurements and Analysis of End-to-End Internet Dynamics, Ph.D. thesis, University of California Berkeley (1997)

    Google Scholar 

  4. Willinger, W., Taqqu, M., Sherman, R., Wilson, D.: Self-similarity through high-variability: Statistical analysis of Ethernet LAN traffic at the source level. IEEE/ACM Transactions on Networking 5(1), 71–86 (1997)

    Article  Google Scholar 

  5. Abry, P., Veitch, D.: Wavelet analysis of long range dependent traffic. IEEE Transactions on Information Theory 44(1) (1998)

    Google Scholar 

  6. Hood, C., Ji, C.: Proactive network fault detection. In: Proceedings of IEEE INFOCOM 1997, Kobe, Japan (April 1997)

    Google Scholar 

  7. Katzela, I., Schwartz, M.: Schemes for fault identification in communications networks. IEEE/ACM Transactions on Networking 3(6), 753–764 (1995)

    Article  Google Scholar 

  8. Ward, A., Glynn, P., Richardson, K.: Internet service performance failure detection. Performance Evaluation Review (August 1998)

    Google Scholar 

  9. Brutlag, J.: Aberrant behavior detection in time series for network monitoring. In: Proceedings of the USENIX Fourteenth System Administration Conference LISA XIV, New Orleans, LA (December 2000)

    Google Scholar 

  10. Barford, P.: A signal Analysis of Network Traffic Anomalies. In: Proceeding of ACM SIGCOMM internet measurement workshop 2002, Zekauskas, M.: A Round-trip Delay Metric for IPPM, RFC 2681, September1999 (1999)

    Google Scholar 

  11. LaKhina, A.: Characterization of network-wide anomalies in traffic flows. In: IMC 2004, October 25-27 (2004)

    Google Scholar 

  12. Caberera, J.B.D.: Statistical traffic modeling for network intrusion detection. In: Proceedings, 8th International symposium on modeling, analysis and simulation of computer and telecommunication systems pp. 466–473 (September 2000)

    Google Scholar 

  13. Yau, S.S., Zhang, X.: Computer Network Intrusion Detection, Assessment and Prevention based on Security Dependency Relation. In: Proc. of COMPSAC 1999 (1999)

    Google Scholar 

  14. Pao, T.-l.: Netflow based intrusion detection system. In: International Conference on networking, sensing & control, March 21-23 (2004)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2006 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Yu, KS., Lee, WH., Ahn, SJ., Chung, JW. (2006). Automatic Location Detection System for Anomaly Traffic on Wired/Wireless Networks. In: Gavrilova, M.L., et al. Computational Science and Its Applications - ICCSA 2006. ICCSA 2006. Lecture Notes in Computer Science, vol 3981. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11751588_102

Download citation

  • DOI: https://doi.org/10.1007/11751588_102

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-34072-0

  • Online ISBN: 978-3-540-34074-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy