Algorithms and Solutions Let us provide AI and Machine Learning Tools for you
Algorithms and Solutions                                 Let us provide AI and Machine Learning Tools for you     

Big Data Cyber Security 

Anomaly detection algorithms can identify the potential malicious traffic patterns entering or leaving on a certain organizations distributive network
 
Packet anlysis of distributive networks

The chart Shows Node Attack 

 

Top plot showing the number of packets on the x-axis and the size of the packet on the y-axis., for one series. The low hanging points are the attacks.

 

bottom plot showing the packet size vs. bernouli probabilities of new IP address (simulated).

 

 

Thr chart shows  the System Attack Scenario in distrubutive network. 

 

Crossing the redline threshold denotes the system attack. The red line denotes the threshold for system attack. The points below are identified as normal and the points above are identified as attacks.

Distributive Network Anomaly Detection.p[...]
Adobe Acrobat document [781.2 KB]

 

 

 

Print Print | Sitemap Recommend this page Recommend this page
© SoftMath Website layout & design by FIVEMAYBESIX