traffic anomaly


Also found in: Medical.

traffic anomaly

A deviation from the normal traffic pattern. An intrusion detection system (IDS) may look for unusual traffic activities, such as a flood of UDP packets or a new service appearing on the network. Traffic anomalies can be used to identify unknown attacks and DoS floods, but tuning the IDS for this can be difficult. It also requires a clear understanding of the "normal" traffic. See IDS.
Mentioned in ?
References in periodicals archive ?
The company reported a network traffic anomaly for a few minutes from one of its non-critical machines.
DefensePro employs multiple detection and prevention engines including signature detection, protocol anomaly detection, stateful inspection and traffic anomaly detection.
It remotely updates TippingPoint systems with new vulnerability filters, signatures, protocol anomaly filters, and traffic anomaly filters to preemptively protect against the latest worms, viruses, Trojans, Denial of Service attacks, Spyware, and VoIP threats.
Sentarus uses a combination of stateful signature, protocol anomaly, traffic anomaly and other advanced detection methods to accurately identify real attacks.
Cisco also officially introduced the renamed Traffic Anomaly Detector XT 5600 and Cisco Guard XT 5650, DoS attack mitigation devices that it acquired when it bought Riverhead Networks in March.
TMC is a nationally supported traffic anomaly information service carried on RDS.
Sentarus uses a combination of stateful signature, protocol anomaly, traffic anomaly and other advanced detection methods to accurately identify real attacks, dropping the connection and responding to new attacks by complete packet denial.
As major service providers actively deploy new IP-based applications and services, IP traffic anomaly detection and intercept are quickly becoming two of the fastest growing technology markets in Latin America," said Chuck Meyo, vice president of global channels and Americas sales at Narus.
IntruPro[TM] IPS uses multiple detection methods, including signature detection, protocol anomaly and traffic anomaly.
Sleuth9 combines signature, protocol and traffic anomaly detection into an integrated solution and utilizes heuristics and proprietary behavior monitoring to block malicious traffic, while allowing good traffic to pass.
It is comprised of a wide variety of Internet security functions, including an Application Defenses(TM) firewall with embedded anti-virus, anti-spam, traffic anomaly detection, IDS/IPS, and a host of other critical protective features.
Uniquely, LANenforcer integrates clientless NAC, stateful firewall, signature-based threat detection, traffic anomaly, protocol anomaly, behavioral anomaly, endpoint quarantine, data encryption, and real-time LAN security event correlation.

Full browser ?