traffic anomaly


Also found in: Medical.

traffic anomaly

A deviation from the normal traffic pattern. An intrusion detection system (IDS) may look for unusual traffic activities, such as a flood of UDP packets or a new service appearing on the network. Traffic anomalies can be used to identify unknown attacks and DoS floods, but tuning the IDS for this can be difficult. It also requires a clear understanding of the "normal" traffic. See IDS.
Mentioned in ?
References in periodicals archive ?
Intrusion Detection EmilinShyni using Naive Bayes 2008 SeongSoo Kim and A traffic anomaly A.
It is comprised of a wide variety of Internet security functions, including an Application Defenses(TM) firewall with embedded anti-virus, anti-spam, traffic anomaly detection, IDS/IPS, and a host of other critical protective features.
Uniquely, LANenforcer integrates clientless NAC, stateful firewall, signature-based threat detection, traffic anomaly, protocol anomaly, behavioral anomaly, endpoint quarantine, data encryption, and real-time LAN security event correlation.
In addition to its signature-based detection, protocol anomaly and traffic anomaly, IntruPro also provides a learning mode feature that creates a profile for all traffic connections.
The Sidewinder G2 Security Appliance's security functions include the Application Defenses(TM) firewall with embedded anti-virus, anti-spam, Web filtering, traffic anomaly detection, IDS/IPS, and many other critical protective features.
The Cisco Traffic Anomaly Detector XT appliance and the new Cisco Traffic Anomaly Detector Service Module for the Cisco 7600 Series Router and Cisco Catalyst(R) 6500 Series Switch for anomaly detection
Security functions include our unprecedented Application Defenses(TM) firewall with embedded anti-virus, anti-spam, traffic anomaly detection, IDS/IPS, and a whole host of other critical protective features.
WHAT: Traffic Anomaly Detection, DDoS Mitigation, Coordinated Attack Fingerprinting; the Fingerprint Sharing Alliance WHO: Danny McPherson, senior director, business development, Arbor Networks With extensive technical leadership in the telecommunications and computer networking industry, Danny oversees business development and partnering activities, and also contributes to Arbor's overall strategy and product architecture.
The Sidewinder G2 Security Appliance's centrally managed capabilities include an Application Defenses(TM) firewall with embedded anti-virus, anti-spam, traffic anomaly detection, IDS/IPS, and a whole host of other critical protective features described below.
the world's leading Carrier-Class IP Platform software provider, to deliver four Narus IP Platform-based applications: Traffic Anomaly Detection, Billing Mediation, NarusLI (Lawful Intercept), and NarusView.
Narus applications include IP Security - Traffic Anomaly and SPAM Detection, IP Monitoring, IP Mediation for billing, and IP Analysis - traffic and customer use in real time.
NarusView integrates with all of Narus' products and applications such as Traffic Anomaly Detection, IP Monitoring, and IP Mediation for Billing.

Full browser ?