Some observations on individual TCP flows behavior in network traffic traces.
Lei QianBrian E. CarpenterPublished in: ISCIT (2011)
Keyphrases
- network traffic
- traffic patterns
- traffic data
- intrusion detection
- computer networks
- anomaly detection
- network monitoring
- traffic volume
- intrusion detection system
- network security
- long range dependence
- traffic analysis
- network bandwidth
- network management
- network intrusion detection
- traffic engineering
- network traffic data
- end to end
- internet traffic
- ip networks
- real world
- databases
- long range
- mobile users
- routing algorithm
- feature selection
- detecting anomalous
- malicious traffic