?url_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Adc&rft.relation=http%3A%2F%2Fmiis.maths.ox.ac.uk%2Fmiis%2F181%2F&rft.title=Analyzing+Network+Traffic+for+Malicious+Hacker+Activity&rft.creator=Pyke%2C+Randall&rft.subject=Information+and+communication+technology&rft.description=Since+the+Internet+came+into+life+in+the+1970s%2C+it+has+been+growing+more+than+100%25+every+year.+On+the+other+hand%2C+the+solutions+to+detecting+network+intrusion+are+far+outpaced.+The+economic+impact+of+malicious+attacks+in+lost+revenue+to+a+single+e-commerce+company+can+vary+from+66+thousand+up+to+53+million+US+dollars.+At+the+same+time%2C+there+is+no+effective+mathematical+model+widely+available+to+distinguish+anomaly+network+behaviours+such+as+port+scanning%2C+system+exploring%2C+virus+and+worm+propagation+from+normal+traffic.%0A%0APDS+proposed+by+Random+Knowledge+Inc.%2C+detects+and+localizes+traffic+patterns+consistent+with+attacks+hidden+within+large+amounts+of+legitimate+traffic.+With+the+network%E2%80%99s+packet+traffic+stream+being+its+input%2C+PDS+relies+on+high+fidelity+models+for+normal+traffic+from+which+it+can+critically+judge+the+legitimacy+of+any+substream+of+packet+traffic.+Because+of+the+reliability+on+an+accurate+baseline+model+for+normal+network+traffic%2C+in+this+workshop%2C+we+concentrate+on+modelling+normal+network+traffic+with+a+Poisson+process.&rft.date=2004&rft.type=Study+Group+Report&rft.type=NonPeerReviewed&rft.format=application%2Fpdf&rft.language=en&rft.identifier=http%3A%2F%2Fmiis.maths.ox.ac.uk%2Fmiis%2F181%2F1%2Frandom_knowledge.pdf&rft.identifier=++Pyke%2C+Randall++(2004)+Analyzing+Network+Traffic+for+Malicious+Hacker+Activity.++%5BStudy+Group+Report%5D+++++