Four prominent anomaly detectors (TRW-CB, Rate Limiting, Maximum Entropy and NETAD ) are evaluated on this dataset. In this paper, we collect and use a labeled dataset containing diverse network anomalies (portscans, TCP floods, UDP floods, at varying rates) and p2p traffic (encrypted and unencrypted with BitTorrent, Vuze, Flashget, μTorrent, Deluge, BitComet, Halite, eDonkey and Kademlia clients) to empirically quantify the impact of p2p traffic on anomaly detection. Surprisingly, the impact of p2p traffic on anomaly detection has not been investigated. Recent studies estimate that peer-to-peer (p2p) traffic comprises 40-70% of today’s Internet traffic.
0 Comments
Leave a Reply. |
Details
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |