Characterizing impulsive network traffic using truncated α-stable processes.
Xiaotong TangMeng MaDiethelm OstryBingli JiaoY. Jay GuoPublished in: IEEE Commun. Lett. (2009)
Keyphrases
- network traffic
- intrusion detection
- anomaly detection
- computer networks
- network security
- intrusion detection system
- network traffic data
- traffic data
- network monitoring
- traffic volume
- network bandwidth
- traffic analysis
- network resources
- network intrusion detection
- internet traffic
- network management
- detecting anomalous
- machine learning
- traffic patterns
- object recognition
- malicious traffic
- real world