By Topic

A hierarchical approach to traffic anomaly detection using image processing technique

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$33 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

3 Author(s)
Chi Yoon Jeong ; Knowledge-based Information Security & Safety Research Department, Electronics and Telecommunication Research Institute, Daejeon, Korea ; Beom-Hwan Chang ; Jung-Chan Na

Increasing malicious network traffic has been serious threats to the network security and network administrators have difficulty to detect the network attacks from vast network traffic. Because an image can contain the much traffic information and intuitively display the network status, it is helpful to reduce the processing time for detecting the anomalies. Therefore we proposed a hierarchical approach to detecting various network attacks using a two-tiered system of image analysis. In a first tier, random attacks are detected by analyzing the global traffic and we will be able to discover semi-random attacks by examining the local traffic images in second tier. The proposed method can effectively detects small-scale attacks like scanning attacks as well as large-scale attacks such as DDos, Worm and etc.

Published in:

Networked Computing and Advanced Information Management (NCM), 2010 Sixth International Conference on

Date of Conference:

16-18 Aug. 2010