{"title":"Diffusion Wavelet-Based Anomaly Detection in Networks","authors":"Hui Tian, Meimei Ding","doi":"10.1109/PDCAT.2016.087","DOIUrl":null,"url":null,"abstract":"Traffic Matrix (TM) can contain information about irregular network topology structure and depict the traffic characteristics of global network. It is a critical parameter to network traffic engineering and attracts significant research interests. Diffusion Wavelet (DW) can perform an effective Multi-Resolution Analysis (MRA)on TM in both temporaland space domains because it intrinsically adapts to the underlying network structure. This paper shows how to apply DW to TM analysis and anomaly detection. By comparing with other anomaly detection methods, it is confirmed thatour method can detect anomaly effectively due to combining with the analysis results by DW.","PeriodicalId":203925,"journal":{"name":"2016 17th International Conference on Parallel and Distributed Computing, Applications and Technologies (PDCAT)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"5","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2016 17th International Conference on Parallel and Distributed Computing, Applications and Technologies (PDCAT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/PDCAT.2016.087","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 5
Abstract
Traffic Matrix (TM) can contain information about irregular network topology structure and depict the traffic characteristics of global network. It is a critical parameter to network traffic engineering and attracts significant research interests. Diffusion Wavelet (DW) can perform an effective Multi-Resolution Analysis (MRA)on TM in both temporaland space domains because it intrinsically adapts to the underlying network structure. This paper shows how to apply DW to TM analysis and anomaly detection. By comparing with other anomaly detection methods, it is confirmed thatour method can detect anomaly effectively due to combining with the analysis results by DW.