Security Analysis Based on Controlling Dependences of Network Traffic Parameters by Wavelet Transformation (original) (raw)

Access this article

Log in via an institution

Subscribe and save

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

REFERENCES

  1. Sheluhin, O.I. and Atayero, A.A., Detection of DoS and DDoS attacks in information communication networks with discrete wavelet analysis, Int. J. Comput. Sci. Inf. Secur., 2012, vol. 10, no. 1, p. 53.
    Google Scholar
  2. Loskutov, A.Yu., Time series analysis. Lecture course, Physical Faculty, Moscow State University. http://chaos.phys.msu.ru/ loskutov/PDF/Lectures_time_series_analysis.pdf. Accessed May 14, 2018.
  3. Kim, S.S., Reddy, A.L.N., and Vannucci, M., Detecting traffic anomalies using discrete wavelet transform, Proceedings of the International Conference on Information Networking, 2004.
  4. Salagean, M. and Firoiu, I., Anomaly detection of network traffic based on Analytical Discrete Wavelet Transform, Proc. of ICC, 2010.
  5. Tishina, N.A., Dvorovoi, I.G., and Solov’ev, N.A., Intrusion detection based on wavelet analysis of network traffic, Vestn. Ufim. Gos. Aviats. Tekh. Univ., 2010, vol. 14, no. 5, pp. 188–194.
    Google Scholar
  6. Kwon, D.W., et al., Wavelet methods for the detection of anomalies and their application to network traffic analysis, Qual. Reliab. Eng. Int., 2006, vol. 22, no. 8, pp. 953–969.
    Article Google Scholar
  7. Shelukhin, O.I. and Garmashev, A.V., Detection of anomalous emissions of telecommunication traffic using discrete wavelet analysis methods, Elektromagn. Volny Elektron. Sist., 2012, vol. 17, no. 2, pp. 15–26.
    Google Scholar
  8. Shelukhin, O.I. and Filinova, A.S., Comparative analysis of algorithms for detecting traffic anomalies using discrete wavelet analysis methods, T-Comm Telekomm. Transp., 2014, vol. 8, no. 9.
  9. Fatkieva, R.R., Atiskov, A.Yu., and Levonevskii, D.K., RF Patent 2 538 292, 2015.
  10. Ishkhanyan, M.V., Osnovy matematicheskogo prognozirovaniya sotsial’no-ekonomicheskikh protsessov (Basics of Mathematical Forecasting of Socio-Economic Processes), Moscow: Mosk. Gos. Univ. Putei Soobshch. Imp. Nikolaya II, 2016.
  11. DARPA Intrusion Detection Evaluation. Intrusion Detection Attacks Database. https://www.ll.mit.edu/ideval/data/1999/training/week2/index.html.
  12. Fatkieva, R.R., Development of attack detection metrics based on network traffic analysis, Vestn. Buryat. Gos. Univ., 2013, no. 9, pp. 81–86.

Download references