Alarm Analysis on Intrusion Detection of Network Flow

2013 
This paper discusses network traffic self-similarity in new field of its security application, and describes Hurst parameter to determine whether the network is abnormal, and timely alarming based on establishing user’ normal behavior model of network flow.
    • Correction
    • Source
    • Cite
    • Save
    • Machine Reading By IdeaReader
    2
    References
    0
    Citations
    NaN
    KQI
    []