Matches in SemOpenAlex for { <https://semopenalex.org/work/W2739601563> ?p ?o ?g. }
Showing items 1 to 83 of
83
with 100 items per page.
- W2739601563 abstract "Attacks against networks and its services are permanent concerns for Internet service providers and datacenters. Several methods for anomaly detection in high-speed links have been researched in the last years. This article evaluates a simple method based on the Holt-Winters forecast model to verify significant changes at the pattern of traffic parameters normally affected in the presence of anomalies. This work also proposes and evaluates the use of filters to increase the effectiveness of the method for the detection of specific types of attacks. Results confirm the usefulness of this proposal to detect malicious traffic related to a TCP SYN flood attack and to the propagation of the Slammer worm, both applied to real traffic samples from the Brazilian NREN. Hosting and collocation services have been commonly used by clients of different magnitudes. The increase in the popularity of these solutions, where providers host wide spread network services like email and web sites in their own clouds, in conjunction with the progressive lower prices of broadband access, promotes a correspondent increase in the providers' network traffic. In consequence, more attention to security issues is needed once the probability of an attack increases as the number of clients grows. Because of this growing picture, a reactive way of dealing with security problems may lead to a decrease in services credibility. So, it becomes important for providers to adopt a proactive way to detect anomalous traffic that may be flowing through the network, in order to take the respective countermeasures as soon as possible. Several methods were proposed in the past years concerning anomaly detection, not all of them proper to be used in Internet Service Providers (ISPs). The work in Silveira 2010 provides a taxonomy for event detection methods that can be used for anomaly detection. The methods are structured as: signature-based (used by IDSes), based on control data (inspects DNS messages or BGP feeds, for example), based on application-specific data (to search for security problems of a specific application), based on non-aggregate traffic data (looks for anomalies at the traffic of a specific host) and based on aggregate traffic data (analyzes the traffic on network links). Considering high volume traffic and the need to detect anomalies of different types, detection based on aggregate traffic is more appropriate for ISPs. It is worth noting that an anomaly is not necessarily caused by malicious activity. For example, link failures or abrupt routing changes also cause traffic anomalies. For this reason, it is also necessary to use root cause analysis to distinguish what kind of problem has been detected (Silveira and Diot 2010). Root cause analysis is out of scope of the present work." @default.
- W2739601563 created "2017-08-08" @default.
- W2739601563 creator A5021533206 @default.
- W2739601563 creator A5087367877 @default.
- W2739601563 date "2010-01-01" @default.
- W2739601563 modified "2023-09-27" @default.
- W2739601563 title "ANOMALY DETECTION USING HOLT-WINTERS FORECAST MODEL" @default.
- W2739601563 cites W1995875735 @default.
- W2739601563 cites W2029332168 @default.
- W2739601563 cites W2053050148 @default.
- W2739601563 cites W2108673751 @default.
- W2739601563 cites W2117747231 @default.
- W2739601563 cites W2120664731 @default.
- W2739601563 cites W2129976399 @default.
- W2739601563 cites W2164210932 @default.
- W2739601563 cites W2169623711 @default.
- W2739601563 cites W9774495 @default.
- W2739601563 hasPublicationYear "2010" @default.
- W2739601563 type Work @default.
- W2739601563 sameAs 2739601563 @default.
- W2739601563 citedByCount "0" @default.
- W2739601563 crossrefType "journal-article" @default.
- W2739601563 hasAuthorship W2739601563A5021533206 @default.
- W2739601563 hasAuthorship W2739601563A5087367877 @default.
- W2739601563 hasConcept C110875604 @default.
- W2739601563 hasConcept C116537 @default.
- W2739601563 hasConcept C124101348 @default.
- W2739601563 hasConcept C136764020 @default.
- W2739601563 hasConcept C144133560 @default.
- W2739601563 hasConcept C15744967 @default.
- W2739601563 hasConcept C162853370 @default.
- W2739601563 hasConcept C17744445 @default.
- W2739601563 hasConcept C199539241 @default.
- W2739601563 hasConcept C2780224610 @default.
- W2739601563 hasConcept C2780378061 @default.
- W2739601563 hasConcept C2780586970 @default.
- W2739601563 hasConcept C38652104 @default.
- W2739601563 hasConcept C41008148 @default.
- W2739601563 hasConcept C739882 @default.
- W2739601563 hasConcept C77805123 @default.
- W2739601563 hasConceptScore W2739601563C110875604 @default.
- W2739601563 hasConceptScore W2739601563C116537 @default.
- W2739601563 hasConceptScore W2739601563C124101348 @default.
- W2739601563 hasConceptScore W2739601563C136764020 @default.
- W2739601563 hasConceptScore W2739601563C144133560 @default.
- W2739601563 hasConceptScore W2739601563C15744967 @default.
- W2739601563 hasConceptScore W2739601563C162853370 @default.
- W2739601563 hasConceptScore W2739601563C17744445 @default.
- W2739601563 hasConceptScore W2739601563C199539241 @default.
- W2739601563 hasConceptScore W2739601563C2780224610 @default.
- W2739601563 hasConceptScore W2739601563C2780378061 @default.
- W2739601563 hasConceptScore W2739601563C2780586970 @default.
- W2739601563 hasConceptScore W2739601563C38652104 @default.
- W2739601563 hasConceptScore W2739601563C41008148 @default.
- W2739601563 hasConceptScore W2739601563C739882 @default.
- W2739601563 hasConceptScore W2739601563C77805123 @default.
- W2739601563 hasLocation W27396015631 @default.
- W2739601563 hasOpenAccess W2739601563 @default.
- W2739601563 hasPrimaryLocation W27396015631 @default.
- W2739601563 hasRelatedWork W1567294858 @default.
- W2739601563 hasRelatedWork W2057318354 @default.
- W2739601563 hasRelatedWork W2067526334 @default.
- W2739601563 hasRelatedWork W2309116512 @default.
- W2739601563 hasRelatedWork W2554186384 @default.
- W2739601563 hasRelatedWork W2597646562 @default.
- W2739601563 hasRelatedWork W2601473781 @default.
- W2739601563 hasRelatedWork W2626127609 @default.
- W2739601563 hasRelatedWork W2782922857 @default.
- W2739601563 hasRelatedWork W27928760 @default.
- W2739601563 hasRelatedWork W2905165217 @default.
- W2739601563 hasRelatedWork W2940498460 @default.
- W2739601563 hasRelatedWork W2942478455 @default.
- W2739601563 hasRelatedWork W2942721818 @default.
- W2739601563 hasRelatedWork W2990169010 @default.
- W2739601563 hasRelatedWork W3020638950 @default.
- W2739601563 hasRelatedWork W3048591325 @default.
- W2739601563 hasRelatedWork W3104151777 @default.
- W2739601563 hasRelatedWork W3176760637 @default.
- W2739601563 hasRelatedWork W816653851 @default.
- W2739601563 isParatext "false" @default.
- W2739601563 isRetracted "false" @default.
- W2739601563 magId "2739601563" @default.
- W2739601563 workType "article" @default.