A Fluid-Based Approach for Modeling Network ActivitiesYen-Hung Hu*
Department of Computer Science, Hampton University, Hampton, Virginia 23668, USA
- *Corresponding Author:
- Yen-Hung Hu
Department of Computer Science
Hampton University, Hampton, Virginia 23668, USA
E-mail: [email protected]
Received Date: May 29, 2013; Accepted Date: August 14, 2013; Published Date: August 16, 2013
Citation: Hu YH (2013) A Fluid-Based Approach for Modeling Network Activities. J Electr Electron Syst 2:110. doi:10.4172/2332-0796.1000110
Copyright: © 2013 Hu YH, et al. This is an open-access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited.
Network traffic traces provide valuable information for researchers to study behaviors of normal and malicious network activities. Although traffic traces are enough to reveal packet-level and connection-level details of most network activities, identifying specific malicious network activities is still a huge challenge: many malicious network activities are able to hide themselves behind normal activities with forged packet and connection information. In practice, mechanisms that are able to effectively extract malicious network activities from raw traffic traces are emerging and will benefit network security and other related communities as well. In this paper, a fluid-based approach for modeling simulated normal and malicious flooding-based denial of service network activities is developed. To approach this goal, several raw traffic traces gathered by the Cooperative Association for Internet Data Analysis (CADIA) are analyzed and investigated.