Statistical Techniques For Detecting Traffic Anomalies Through Packet Header Data

ProjectStoc - 32 pages 4139 words 1184 views Project Diploma/Degree/Masters Level Computer Science ₦3000 Naira ($7.89 USD)

This is a Premium work, paid access only

Register/Login to Access Full Work

ABSTRACT
This paper proposes a traffic anomaly detector, operated in postmortem and in real-time, by passively monitoring packet headers of traffic. The frequent attacks on network infrastructure, using various forms of denial of service attacks, have led to an increased need for developing techniques for analyzing network traffic. If efficient analysis tools were available, it could become possible to detect the attacks, anomalies and to take action to contain the attacks appropriately before they have had time to propagate across the network. In this paper, we suggest a technique for traffic anomaly detection based on analyzing correlation of destination IP addresses in outgoing traffic at an egress router. This address correlation data are transformed using discrete wavelet transform for effective detection of anomalies through statistical analysis. Results from trace-driven evaluation suggest that proposed approach could provide an effective means of detecting anomalies close to the source. We also present a multidimensional indicator using the correlation of port numbers and the number of flows as a means of detecting anomalies.

TABLE OF CONTENT
TITLE PAGE                                    
CERTIFICATION                                
APPROVAL                                
DEDICATION                                    
ACKNOWLEDGEMENT                        
ABSTRACT                                    
TABLE OF CONTENT                                

CHAPTER ONE
1.0    INTRODUCTION                            
1.1    STATEMENT OF PROBLEM                        
1.2    PURPOSE OF STUDY                            
1.3    AIMS AND OBJECTIVES                         
1.4    SCOPE/DELIMITATIONS                        
1.5    LIMITATIONS/CONSTRAINTS                        
1.6    DEFINITION OF TERMS                        

CHAPTER TWO
2.0    LITERATURE REVIEW                            

CHAPTER THREE
3.0    METHODS FOR FACT FINDING AND DETAILED DISCUSSIONS OF THE SYSTEM
3.1     METHODOLOGIES FOR FACT-FINDING
3.2    DISCUSSIONS             

CHAPTER FOUR
4.0    FUTURES, IMPLICATIONS AND CHALLENGES OF THE SYSTEM
4.1    FUTURES
4.2    IMPLICATIONS
4.3    CHALLENGES

CHAPTER FIVE
5.0    RECOMMENDATIONS, SUMMARY AND CONCLUSION        
5.1    RECOMMENDATION                            
5.2    SUMMARY                                
5.3    CONCLUSION                                
5.4    REFERENCES
                

Disclaimer: Note this academic material is intended as a guide for your academic research work. Do not copy word for word. Note: For Computer or Programming related works, some works might not contain source codes

CITE THIS WORK

(2014, 08). Statistical Techniques For Detecting Traffic Anomalies Through Packet Header Data.. ProjectStoc.com. Retrieved 08, 2014, from https://projectstoc.com/read/2762/statistical-techniques-for-detecting-traffic-anomalies-through-packet-header-data-931
"Statistical Techniques For Detecting Traffic Anomalies Through Packet Header Data." ProjectStoc.com. 08 2014. 2014. 08 2014 <https://projectstoc.com/read/2762/statistical-techniques-for-detecting-traffic-anomalies-through-packet-header-data-931>.
"Statistical Techniques For Detecting Traffic Anomalies Through Packet Header Data.." ProjectStoc.com. ProjectStoc.com, 08 2014. Web. 08 2014. <https://projectstoc.com/read/2762/statistical-techniques-for-detecting-traffic-anomalies-through-packet-header-data-931>.
"Statistical Techniques For Detecting Traffic Anomalies Through Packet Header Data.." ProjectStoc.com. 08, 2014. Accessed 08, 2014. https://projectstoc.com/read/2762/statistical-techniques-for-detecting-traffic-anomalies-through-packet-header-data-931.

Connect with Us