Computer Science ›› 2008, Vol. 35 ›› Issue (5): 108-112.

Previous Articles     Next Articles

YANG Ya-hui (School of Software & Microelectronics, Peking University, Beijing 102600,China)   

  • Online:2018-11-16 Published:2018-11-16

Abstract: Anomaly detection and analysis based on network traffic are used to monitor and locate network anomalies for network and security management. In this paper, we list 3 types of network traffic data and various kinds of traffic anomalies. After that, the re

Key words: Network traffic, Network flow, Network anomaly, Anomalous detection

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!