Usage of Modified Holt-Winters Method in the Anomaly Detection of Network Traffic: Case Studies
The traditional Holt-Winters method is used, among others, in behavioural analysis of network traffic for development of adaptive models for various types of traffic in sample computer networks. This paper is devoted to the application of extended versions of these models for development of predicte...
Saved in:
Main Authors: | , |
---|---|
Format: | Article |
Language: | English |
Published: |
Wiley
2012-01-01
|
Series: | Journal of Computer Networks and Communications |
Online Access: | http://dx.doi.org/10.1155/2012/192913 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
_version_ | 1832551405894762496 |
---|---|
author | Maciej Szmit Anna Szmit |
author_facet | Maciej Szmit Anna Szmit |
author_sort | Maciej Szmit |
collection | DOAJ |
description | The traditional Holt-Winters method is used, among others, in behavioural analysis of network traffic for development of adaptive models for various types of traffic in sample computer networks. This paper is devoted to the application of extended versions of these models for development of predicted templates and intruder detection. |
format | Article |
id | doaj-art-8fa322525e884cf2b8538df529889199 |
institution | Kabale University |
issn | 2090-7141 2090-715X |
language | English |
publishDate | 2012-01-01 |
publisher | Wiley |
record_format | Article |
series | Journal of Computer Networks and Communications |
spelling | doaj-art-8fa322525e884cf2b8538df5298891992025-02-03T06:01:30ZengWileyJournal of Computer Networks and Communications2090-71412090-715X2012-01-01201210.1155/2012/192913192913Usage of Modified Holt-Winters Method in the Anomaly Detection of Network Traffic: Case StudiesMaciej Szmit0Anna Szmit1Computer Engineering Department, Technical University of Lodz, 18/22 Stefanowskiego Street, 90-924 Lodz, PolandDepartment of Management, Technical University of Lodz, 266 Piotrkowska Street, 90-924 Lodz, PolandThe traditional Holt-Winters method is used, among others, in behavioural analysis of network traffic for development of adaptive models for various types of traffic in sample computer networks. This paper is devoted to the application of extended versions of these models for development of predicted templates and intruder detection.http://dx.doi.org/10.1155/2012/192913 |
spellingShingle | Maciej Szmit Anna Szmit Usage of Modified Holt-Winters Method in the Anomaly Detection of Network Traffic: Case Studies Journal of Computer Networks and Communications |
title | Usage of Modified Holt-Winters Method in the Anomaly Detection of Network Traffic: Case Studies |
title_full | Usage of Modified Holt-Winters Method in the Anomaly Detection of Network Traffic: Case Studies |
title_fullStr | Usage of Modified Holt-Winters Method in the Anomaly Detection of Network Traffic: Case Studies |
title_full_unstemmed | Usage of Modified Holt-Winters Method in the Anomaly Detection of Network Traffic: Case Studies |
title_short | Usage of Modified Holt-Winters Method in the Anomaly Detection of Network Traffic: Case Studies |
title_sort | usage of modified holt winters method in the anomaly detection of network traffic case studies |
url | http://dx.doi.org/10.1155/2012/192913 |
work_keys_str_mv | AT maciejszmit usageofmodifiedholtwintersmethodintheanomalydetectionofnetworktrafficcasestudies AT annaszmit usageofmodifiedholtwintersmethodintheanomalydetectionofnetworktrafficcasestudies |