2013 Volume 30 Issue 2 Pages 2_23-2_32
This survey paper discusses anomaly detection in Internet backbone traffic. We first briefly explain anomalous traffic harmful to users and network operators, then describe several types of anomaly detection algorithms in the recent literature. Finally, we demonstrate the time evolution of anomalies detected by four different anomaly detectors in Internet backbone traffic over 10 years.