• Aucun résultat trouvé

ONTIC: D5.4: Use Case #1 Network Intrusion Detection

N/A
N/A
Protected

Academic year: 2021

Partager "ONTIC: D5.4: Use Case #1 Network Intrusion Detection"

Copied!
71
0
0

Texte intégral

Loading

Figure

Figure 1: Dashboard UML Use Case Model.
Figure 2 represents the high level working schema of the UC #1 system. PCAP files, containing  traffic  traces,  provide  input  to  both  subsystems  −the  anomaly  detection  and  the  dashboard  subsystems
Figure 3: UC #1 Dashboard Functional View
Figure 4: UML specification of UC #1 on anomaly detection
+7

Références

Documents relatifs

The reason is that streaming flows have intrinsic durations and thus volumes proportional to their rate: in the limiting case where the elastic traffic intensity alone is close

∗ Index Terms: Anomaly Detection, Support Vector Ma- chines (SVMs), One-Class SVMs, Unsupervised Learning, Model Selection, Similarity Measure, Multivariate Time Series (MTS)..

The tool proposed in this paper can be regarded as a starting point for the development of advanced cyber-physical protection systems, that are able to exploit classical fault

Sequential detection (and isolation) of unusual and significant changes in network Origin-Destination (OD) traffic volumes from simple link load measurements is considered in

The method pro- posed in this paper consists of finding a linear parsimonious model of ambient traffic (nuisance parameter) and detecting anomalies by using an invariant

Among available grid clustering algorithms, GDCA (Grid Density-based Clustering Algorithm) [4] offers many advan- tages; it is a density based grid clustering, able to discover

features based on a time sliding window is generic enough so that any detector which is fast enough can be implemented on top of it and thus detect anomalies in a continuous way. The

In order to identify any form of cluster, UNADA is based on a density based grid algorithm DBSCAN (Density-Based Spatial Clustering of Applications with Noise) [8] which takes