Teaching Management and Monitoring Abnormal Network Behaviors Under COVID-19

Teaching Management and Monitoring Abnormal Network Behaviors Under COVID-19

Yao Li, Ping Luo
Copyright: © 2021 |Pages: 9
DOI: 10.4018/IJDST.2021040106
OnDemand:
(Individual Articles)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

Due to the epidemic of COVID-19, more social activities have been moved to the internet, such as online education and online learning. The education management to avoid burst events is a basic requirement of online education, especially when a huge number of persons are visiting at the same time. In order to monitor the abnormal and burst access in online education systems, this paper proposes an anomaly detection method by using data flow to mining high frequency events among massive network traffic data during online education. First, the data flow in traffic network is described as a special structure which is used to establish an efficient high frequent event detection algorithm. Second, the network traffic flow is reduced to make it possible to monitor large-scale concurrent network visiting. The effectiveness of the abnormal network behavior detection method is verified through the experiment on a real network environment for online education.
Article Preview
Top

2. Bursty And High-Frequent Access Detection

The bursty and high-frequent access is the one that can be observed at high-level network monitoring points and appears repeatedly and periodically for a period time (Yang 2020). However, the access is a small probability abnormal event on macro-time scale.

The bursty and high-frequency access detection in the high-speed network traffic environment differs from the traditional network intrusion detection. In bursty and high-frequent access in the high-speed network, the aim is to monitors and discover the potential sudden and high-frequency access which behaves different from the conventional distribution information. In the massive amount of data passing through at high speed, these bursty and high-frequent events can be discovered in time, and these sudden high-frequency events can be correlated with network security events through other related methods, which is convenient for grasping the status of large-scale networks in a real-time manner. The emergency response is reacted for bursty and high-frequent access.

It is unrealistic and impractical to perform local analysis by copying each network data item that arrives at the high-level monitoring point of the high-speed backbone network. The monitoring must be on-the-fly without reservation, which requires the bursty and high-frequent access detection is with low time complexity. This paper introduces a data stream model which is a new data preprocessing method for network application in recent years (Agrawal 2016). The major advantage of data stream model is that it can perform in real-time and one-pass. In one-pass processing, no or less data is required to be retained.

Complete Article List

Search this Journal:
Reset
Volume 15: 1 Issue (2024)
Volume 14: 2 Issues (2023)
Volume 13: 8 Issues (2022)
Volume 12: 4 Issues (2021)
Volume 11: 4 Issues (2020)
Volume 10: 4 Issues (2019)
Volume 9: 4 Issues (2018)
Volume 8: 4 Issues (2017)
Volume 7: 4 Issues (2016)
Volume 6: 4 Issues (2015)
Volume 5: 4 Issues (2014)
Volume 4: 4 Issues (2013)
Volume 3: 4 Issues (2012)
Volume 2: 4 Issues (2011)
Volume 1: 4 Issues (2010)
View Complete Journal Contents Listing