Intrusion Detection EmilinShyni using Naive Bayes 2008 SeongSoo Kim and A traffic anomaly
When the direction of a new trajectory is not the same as the one of the directions of normal motion patterns, traffic anomaly
As the alarm system for the quality of mobile communication network operation and maintenance, the system has five types of integrated management system of equipment level alarm, performance level alarms or indicators, perception service alarm, volume overload alarms or indicators, and network traffic anomaly
analysis (Figure 1).
DefensePro employs multiple detection and prevention engines including signature detection, protocol anomaly detection, stateful inspection and traffic anomaly
Through its unified threat management (UTM) approach, Sidewinder delivers best-of-breed anti-virus/spyware and anti-spam/fraud protection, Web content filtering, traffic anomaly
detection, intrusion detection and prevention, and many other critical protective features.
Cisco also officially introduced the renamed Traffic Anomaly
Detector XT 5600 and Cisco Guard XT 5650, DoS attack mitigation devices that it acquired when it bought Riverhead Networks in March.
 Nychis G, Sekar V and Andersen DG, "An empirical evaluation of entropy-based traffic anomaly
detection," in Proc.
Kamoun, "Traffic anomaly
detection and characterization in the tunisian national university network," in Proc.
Sentarus uses a combination of stateful signature, protocol anomaly, traffic anomaly
and other advanced detection methods to accurately identify real attacks.