Skip to main content

A Statistical Model for Detecting Abnormality in Static-Priority Scheduling Networks with Differentiated Services

  • Conference paper
Computational Intelligence and Security (CIS 2005)

Part of the book series: Lecture Notes in Computer Science ((LNAI,volume 3802))

Included in the following conference series:

Abstract

This paper presents a new statistical model for detecting signs of abnormality in static-priority scheduling networks with differentiated services at connection levels on a class-by-class basis. The formulas in terms of detection probability, miss probability, probabilities of classifications, and detection threshold are proposed.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Li, M.: An Approach to Reliably Identifying Signs of DDOS Flood Attacks based on LRD Traffic Pattern Recognition. Computer & Security 23, 549–558 (2004)

    Article  Google Scholar 

  2. Bettati, R., Zhao, W., Teodor, D.: Real-Time Intrusion Detection and Suppression in ATM Networks. In: Proc., the 1st USENIX Workshop on Intrusion Detection and Network Monitoring, April 1999, pp. 111–118 (1999)

    Google Scholar 

  3. Schultz, E.: Intrusion Prevention. Computer & Security 23, 265–266 (2004)

    Article  Google Scholar 

  4. Cho, S.-B., Park, H.-J.: Efficient Anomaly Detection by Modeling Privilege Flows Using Hidden Markov Model. Computer & Security 22, 45–55 (2003)

    Article  Google Scholar 

  5. Cho, S., Cha, S.: SAD: Web Session Anomaly Detection based on Parameter Estimation. Computer & Security 23, 312–319 (2004)

    Article  Google Scholar 

  6. Gong, F.: Deciphering Detection Techniques: Part III Denial of Service Detection. White Paper, McAfee Network Security Technologies Group (January 2003)

    Google Scholar 

  7. Sorensen, S.: Competitive Overview of Statistical Anomaly Detection. White Paper, Juniper Networks Inc. (2004), www.juniper.net

  8. Michiel, H., Laevens, K.: Teletraffic Engineering in a Broad-Band Era. Proc. IEEE 85, 2007–2033 (1997)

    Article  Google Scholar 

  9. Willinger, W., Paxson, V.: Where Mathematics Meets the Internet. Notices of the American Mathematical Society 45, 961–970 (1998)

    MATH  MathSciNet  Google Scholar 

  10. Li, M., Zhao, W., et al.: Modeling Autocorrelation Functions of Self-Similar Teletraffic in Communication Networks based on Optimal Approximation in Hilbert Space. Applied Mathematical Modelling 27, 155–168 (2003)

    Article  MATH  Google Scholar 

  11. Li, M., Lim, S.C.: Modeling Network Traffic Using Cauchy Correlation Model with Long-Range Dependence. Modern Physics Letters B 19, 829–840 (2005)

    Article  MATH  Google Scholar 

  12. Boudec, L., Yves, J., Patrick, T.: Network Calculus, A Theory of Deterministic Queuing Systems for the Internet. Springer, Heidelberg (2001)

    Google Scholar 

  13. Wang, S., Xuan, D., Bettati, R., Zhao, W.: Providing Absolute Differentiated Services for Real-Time Applications in Static-Priority Scheduling Networks. IEEE/ACM T. Networking 12, 326–339 (2004)

    Article  Google Scholar 

  14. Cruz, L.: A Calculus for Network Delay, Part I: Network Elements in Isolation; Part II: Network Analysis. IEEE T. Inform. Theory 37, 114–131, 132-141 (1991)

    Article  MATH  MathSciNet  Google Scholar 

  15. Chang, C.S.: On Deterministic Traffic Regulation and Service Guarantees: a Systematic Approach by Filtering. IEEE T. Information Theory 44, 1097–1109 (1998)

    Article  MATH  Google Scholar 

  16. Estan, C., Varghese, G.: New Directions in Traffic Measurement and Accounting: Focusing on the Elephants, Ignoring the Mice. ACM T. Computer Systems 21, 270–313 (2003)

    Article  Google Scholar 

  17. Minei, I.: MPLS DiffServ-Aware Traffic Engineering. White Paper, Juniper Networks Inc. (2004), www.juniper.net

  18. Leach, J.: TBSE—An Engineering Approach to The Design of Accurate and Reliable Security Systems. Computer & Security 23, 265–266 (2004)

    Article  Google Scholar 

  19. Kemmerer, R.A., Vigna, G.: Intrusion Detection: a Brief History and Overview. Supplement to Computer (IEEE Security & Privacy) 35, 27–30 (2002)

    Google Scholar 

  20. Bendat, J.S., Piersol, A.G.: Random Data: Analysis and Measurement Procedure, 2nd edn. John Wiley & Sons, Chichester (1991)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Li, M., Zhao, W. (2005). A Statistical Model for Detecting Abnormality in Static-Priority Scheduling Networks with Differentiated Services. In: Hao, Y., et al. Computational Intelligence and Security. CIS 2005. Lecture Notes in Computer Science(), vol 3802. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11596981_39

Download citation

  • DOI: https://doi.org/10.1007/11596981_39

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-30819-5

  • Online ISBN: 978-3-540-31598-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics