Skip to main content

Network Anomaly Detection Based on the Statistical Self-similarity Factor

  • Conference paper
  • First Online:
Analysis and Simulation of Electrical and Computer Systems

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 324))

Abstract

The actual network traffic is self-similar or long-range dependent. Self-similarity analysis and anomaly detection in networks are interesting field of research and scientific work of scientists around the world. Simulation studies have demonstrated that the Hurst parameter estimation can be used to detect traffic anomaly—the Hurst values are compared with confidence intervals of normal values to detect anomaly in few kinds of traffic: TCP, UDP. The dramatic expansion of applications on modern networks gives rise to a fundamental challenge to network security. Therefore, it is important to reduce the burstiness for better network performance, and thereby detect traffic anomalies.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Strzałka B, Mazurek M, Strzałka D (2012) Queue performance in presence of long-range dependencies—an empirical study. Int J Inf Sci 2(4):47–53

    Google Scholar 

  2. Dymora P, Mazurek M, Strzałka D (2013) Computer network traffic analysis with the use of statistical self-similarity factor. Ann UMCS Informatica 13(2):69–81

    Google Scholar 

  3. Yan R, Wang Y (2012) Hurst parameter for security evaluation of LAN traffic. Inf Technol J 11(20):269–275

    Article  Google Scholar 

  4. Idris MY, Abdullah AH, Maarof MA (2005) Self-similarity measurement methods for network traffic anomaly detection, In: Proceedings of the postgraduate annual research seminar, pp 244–248

    Google Scholar 

  5. Dymora P, Mazurek M, Strzałka D (2012) Long-range dependencies in memory pages reads during man-compute system interaction. Ann UMCS Informatica XII 2:49–58

    Google Scholar 

  6. Dymora P, Mazurek M, Strzałka D (2011) Statistical mechanics of memory pages reads during man–computer system interaction. Metody Informatyki Stosowanej 1(26):15–21

    Google Scholar 

  7. Dymora P, Mazurek M, Strzałka D (2012) Influence of batch structure on cluster computing performance—complex systems approach. Ann UMCS Informatica XII 1:57–66

    Google Scholar 

  8. Dietmar S (1988) Algorithms for random fractals, chapter 2 of the science of fractal images by Barnsley et al, Springer, New York

    Google Scholar 

  9. Cai J, Liu WX (2013) A new Method of detecting network traffic anomalies. In: Proceedings of the 2nd international conference on computer science and electronics engineering, pp 2800–2803

    Google Scholar 

  10. Thottan M, Ji Ch (2003) Anomaly detection in IP networks. IEEE Trans Signal Process 51(8):2191–2204

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Paweł Dymora .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this paper

Cite this paper

Dymora, P., Mazurek, M. (2015). Network Anomaly Detection Based on the Statistical Self-similarity Factor. In: Gołębiowski, L., Mazur, D. (eds) Analysis and Simulation of Electrical and Computer Systems. Lecture Notes in Electrical Engineering, vol 324. Springer, Cham. https://doi.org/10.1007/978-3-319-11248-0_21

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-11248-0_21

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-11247-3

  • Online ISBN: 978-3-319-11248-0

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics