Detection of malicious activity in the network still is a challenge. The self-similarity feature of traffic can be used in an anomaly detection method. The influence of traffic generated by intruder who performs access attack is analyzed. In the other hands the simulation of threads is useful in designing and testing processes of a network. For this purpose a multi-layer 'on-off' model of traffic source is developed and a traffic generator is implemented according this model. Finally the real traffic including attacker flow is compared to the traffic generated by generator. This comparison proves that it is possible to simulate traffic similar to malicious one. © 2012 Springer-Verlag Berlin Heidelberg.
CITATION STYLE
Kolbusz, J., Rozycki, P., & Korniak, J. (2012). The simulation of malicious traffic using self-similar traffic model. Advances in Intelligent and Soft Computing, 98, 327–341. https://doi.org/10.1007/978-3-642-23187-2_21
Mendeley helps you to discover research relevant for your work.