Statistical Techniques For Detecting Traffic Anomalies Through Packet Header Data

ProjectStoc - 32 pages 4127 words 1228 views Project Diploma/Degree/Masters Level Computer Science ₦3000 Naira ($7.89 USD)

This is a Premium work, paid access only

Register/Login to Access Full Work

ABSTRACT
This paper proposes a traffic anomaly detector, operated in postmortem and in real-time, by passively monitoring packet headers of traffic. The frequent attacks on network infrastructure, using various forms of denial of service attacks, have led to an increased need for developing techniques for analyzing network traffic. If efficient analysis tools were available, it could become possible to detect the attacks, anomalies and to take action to contain the attacks appropriately before they have had time to propagate across the network. In this paper, we suggest a technique for traffic anomaly detection based on analyzing correlation of destination IP addresses in outgoing traffic at an egress router. This address correlation data are transformed using discrete wavelet transform for effective detection of anomalies through statistical analysis. Results from trace-driven evaluation suggest that proposed approach could provide an effective means of detecting anomalies close to the source. We also present a multidimensional indicator using the correlation of port numbers and the number of flows as a means of detecting anomalies.

TABLE OF CONTENT
TITLE PAGE
CERTIFICATION
APPROVAL
DEDICATION
ACKNOWLEDGEMENT
ABSTRACT
TABLE OF CONTENT

CHAPTER ONE
1.0 INTRODUCTION
1.1 STATEMENT OF PROBLEM
1.2 PURPOSE OF STUDY
1.3 AIMS AND OBJECTIVES
1.4 SCOPE/DELIMITATIONS
1.5 LIMITATIONS/CONSTRAINTS
1.6 DEFINITION OF TERMS

CHAPTER TWO
2.0 LITERATURE REVIEW

CHAPTER THREE
3.0 METHODS FOR FACT FINDING AND DETAILED DISCUSSIONS OF THE SYSTEM
3.1 METHODOLOGIES FOR FACT-FINDING 
3.2 DISCUSSIONS

CHAPTER FOUR
4.0 FUTURES, IMPLICATIONS AND CHALLENGES OF THE SYSTEM 
4.1 FUTURES 
4.2 IMPLICATIONS
4.3 CHALLENGES

CHAPTER FIVE
5.0 RECOMMENDATIONS, SUMMARY AND CONCLUSION
5.1 RECOMMENDATION
5.2 SUMMARY
5.3 CONCLUSION
5.4 REFERENCES

Disclaimer: Note this academic material is intended as a guide for your academic research work. Do not copy word for word. Note: For Computer or Programming related works, some works might not contain source codes

CITE THIS WORK

(2014, 08). Statistical Techniques For Detecting Traffic Anomalies Through Packet Header Data.. ProjectStoc.com. Retrieved 08, 2014, from https://projectstoc.com/read/2767/statistical-techniques-for-detecting-traffic-anomalies-through-packet-header-data-9153
"Statistical Techniques For Detecting Traffic Anomalies Through Packet Header Data." ProjectStoc.com. 08 2014. 2014. 08 2014 <https://projectstoc.com/read/2767/statistical-techniques-for-detecting-traffic-anomalies-through-packet-header-data-9153>.
"Statistical Techniques For Detecting Traffic Anomalies Through Packet Header Data.." ProjectStoc.com. ProjectStoc.com, 08 2014. Web. 08 2014. <https://projectstoc.com/read/2767/statistical-techniques-for-detecting-traffic-anomalies-through-packet-header-data-9153>.
"Statistical Techniques For Detecting Traffic Anomalies Through Packet Header Data.." ProjectStoc.com. 08, 2014. Accessed 08, 2014. https://projectstoc.com/read/2767/statistical-techniques-for-detecting-traffic-anomalies-through-packet-header-data-9153.

Connect with Us