Evaluation of network traffic workload scaling techniques.
Kristof SleursJan PotemansJohan TheunisDagang LiEmmanuel Van LilAntoine Van de CapellePublished in: Comput. Commun. (2007)
Keyphrases
- network traffic
- intrusion detection
- anomaly detection
- computer networks
- network security
- intrusion detection system
- traffic analysis
- traffic volume
- network bandwidth
- network intrusion detection
- network monitoring
- traffic data
- network management
- detecting anomalous
- long range dependence
- response time
- network resources
- detect anomalies