Paper Title:
An Abnormal IP Traffic Detection Model Based on Scale-Free Network
  Abstract

A model of detecting an abnormal IP traffic in a subset of network is described. The model is based on the hypothesis that random sampling subnet are the same probability distribution as the entire network if some conditions are met with, nodes’s degree in IP traffic can be processed as a power-law distribution in scale-free network . The model analyzes the power exponent and relations between the anomalous behavior and parameter r. Finally, a test was conducted by the data, some type attacks could be identified exactly. the model provides a new framework for intrusion-detection system.

  Info
Periodical
Edited by
Ran Chen
Pages
849-853
DOI
10.4028/www.scientific.net/AMM.44-47.849
Citation
J. Li, Y. Niu, "An Abnormal IP Traffic Detection Model Based on Scale-Free Network", Applied Mechanics and Materials, Vols. 44-47, pp. 849-853, 2011
Online since
December 2010
Authors
Export
Price
$32.00
Share

In order to see related information, you need to Login.

In order to see related information, you need to Login.

Authors: Shu Liang Li, Dan Wang, Le Zhang
Abstract:We propose an evolutionary model for weighted network according to characteristics of real-life network, and the weighted model integrates...
442
Authors: Cong Huang, D G Zhang, T J Yang, H Yang
Chapter 8: Surveying and Detection Engineering, Cartography, Measurement and Geographic Information System
Abstract:Recent studies have shown that subnets of scale-free networks are not scale-free, which make it difficult to extrapolate from subnet data to...
2396
Authors: Jun Tao Yang, Hui Wen Deng
Chapter 18: Information Technologies, Image and Video Processing, Computer and Data Analysis Applications in Industry and Engineering
Abstract:Assigning the value of interest to each node in the network, we give a scale-free network model. The value of interest is related to the...
2959
Authors: Shuai Xu, Bai Da Zhang
Chapter 6: Information Technologies, WEB and Networks Engineering, Information Security, Software Application and Development
Abstract:Human life is in a complex network world. In everyday life, the network can be a physical object such as the Internet, power network, road...
1589