Modeling traffic flow using conversation exchange dynamics for identifying network attacks

0Citations
Citations of this article
1Readers
Mendeley users who have this article in their library.
Get full text

Abstract

We present a novel approach to identifying anomalous network events Specifically, a method for characterizing and displaying the flow of conversations across a distributed system with a high number of interacting entities is discussed and analyzed. Results from from attacks contained in the DARPA Lincoln Lab IDS test data and from operational network traffic are presented. These results suggest that our approach presents a unique perspective on anomalies in computer network traffic. © Springer-Verlag 2004.

Cite

CITATION STYLE

APA

Mylavarapu, S., McEachen, J. C., Zachary, J. M., Walch, S. L., & Marinovich, J. S. (2004). Modeling traffic flow using conversation exchange dynamics for identifying network attacks. Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 3262, 317–326. https://doi.org/10.1007/978-3-540-30197-4_32

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free