The Study of Traffic Flow Anomalies in a LAN

In the paper self-similarity of traffic flows in local area network is compared in the normal operation environment and in the presence of malicious traffic like attacks, virus activity and spam. The Hurst parameter has been used in this comparison. The results shows that this parameter is changing when malicious traffic is added to normal traffic. Therefore it has been concluded that this method can be used to detect malicious traffic in local are networks.