Detection Network Anomalies Based on Packet and Flow Analysis.
Hong WangZhenghu GongQing GuanBaosheng WangPublished in: ICN (2008)
Keyphrases
- flow analysis
- anomaly detection
- forensic analysis
- network attacks
- computer networks
- normal traffic
- detect anomalies
- network traffic
- object detection
- internet traffic
- packet size
- detection algorithm
- intrusion detection
- information flow
- communication networks
- switched networks
- ip traffic
- packet filtering
- network devices
- network model
- network security
- internet protocol
- network design
- transmission delay
- supply chain
- packet switching
- mobile devices