traffic anomaly


Also found in: Medical.

traffic anomaly

A deviation from the normal traffic pattern. An intrusion detection system (IDS) may look for unusual traffic activities, such as a flood of UDP packets or a new service appearing on the network. Traffic anomalies can be used to identify unknown attacks and DoS floods, but tuning the IDS for this can be difficult. It also requires a clear understanding of the "normal" traffic. See IDS.
Mentioned in ?
References in periodicals archive ?
Intrusion Detection EmilinShyni using Naive Bayes 2008 SeongSoo Kim and A traffic anomaly A.
When the direction of a new trajectory is not the same as the one of the directions of normal motion patterns, traffic anomaly must occur.
As the alarm system for the quality of mobile communication network operation and maintenance, the system has five types of integrated management system of equipment level alarm, performance level alarms or indicators, perception service alarm, volume overload alarms or indicators, and network traffic anomaly analysis (Figure 1).
DefensePro employs multiple detection and prevention engines including signature detection, protocol anomaly detection, stateful inspection and traffic anomaly detection.
Through its unified threat management (UTM) approach, Sidewinder delivers best-of-breed anti-virus/spyware and anti-spam/fraud protection, Web content filtering, traffic anomaly detection, intrusion detection and prevention, and many other critical protective features.
Cisco also officially introduced the renamed Traffic Anomaly Detector XT 5600 and Cisco Guard XT 5650, DoS attack mitigation devices that it acquired when it bought Riverhead Networks in March.
[12] Nychis G, Sekar V and Andersen DG, "An empirical evaluation of entropy-based traffic anomaly detection," in Proc.
Kamoun, "Traffic anomaly detection and characterization in the tunisian national university network," in Proc.
Sentarus uses a combination of stateful signature, protocol anomaly, traffic anomaly and other advanced detection methods to accurately identify real attacks.

Full browser ?