We present a novel approach to identifying anomalous network events Specifically, a method for characterizing and displaying the flow of conversations across a distributed system with a high number of interacting entities is discussed and analyzed. Results from from attacks contained in the DARPA Lincoln Lab IDS test data and from operational network traffic are presented. These results suggest that our approach presents a unique perspective on anomalies in computer network traffic. © Springer-Verlag 2004.
CITATION STYLE
Mylavarapu, S., McEachen, J. C., Zachary, J. M., Walch, S. L., & Marinovich, J. S. (2004). Modeling traffic flow using conversation exchange dynamics for identifying network attacks. Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 3262, 317–326. https://doi.org/10.1007/978-3-540-30197-4_32
Mendeley helps you to discover research relevant for your work.