A survey of network flow applications
B Li, J Springer, G Bebis, MH Gunes - Journal of Network and Computer …, 2013 - Elsevier
It has been over 16 years since Cisco's NetFlow was patented in 1996. Extensive research
has been conducted since then and many applications have been developed. In this survey …
has been conducted since then and many applications have been developed. In this survey …
Flow based monitoring of ICS communication in the smart grid
A smart grid network is a part of critical infrastructure, and its interruption or blackout may
cause fatal consequences on energy production, distribution, and eventually lives of people …
cause fatal consequences on energy production, distribution, and eventually lives of people …
Likelihood-based inference for modelling packet transit from thinned flow summaries
P Rahman, B Beranger, S Sisson… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Network traffic speeds and volumes present practical challenges to analysis. Packet thinning
and flow aggregation protocols provide smaller structured data summaries, but conversely …
and flow aggregation protocols provide smaller structured data summaries, but conversely …
Analysis of Internet service user audiences for network security problems
AM Sukhov, ES Sagatov… - 2014 IEEE 2nd …, 2014 - ieeexplore.ieee.org
In this paper an Internet service audience is studied in order to create a user kernel, with the
audience represented as a list of IP addresses able to authorize access to the beginning of a …
audience represented as a list of IP addresses able to authorize access to the beginning of a …
[PDF][PDF] Network anomaly detection using unsupervised model
P Gogoi, B Borah… - International Journal of …, 2011 - researchgate.net
Most existing network intrusion detection systems use signaturebased methods which
depend on labeled training data. This training data is usually expensive to produce due to …
depend on labeled training data. This training data is usually expensive to produce due to …
A Performance Study of Flow-Based Monitoring in Internet of Vehicles
M Zang, L Dittmann, Y Yan - … on Network of the Future (NoF), 2021 - ieeexplore.ieee.org
The Internet of Vehicles (IoV) sustains the ubiquitous communications and diverse services
among vehicles throughout the Internet access, which would generate a huge volume of …
among vehicles throughout the Internet access, which would generate a huge volume of …
Fine-grained Identification for SSL/TLS Packets
L Kong, Y Zhou, G Huang, H Wang - International Journal of …, 2020 - airitilibrary.com
SSL/TLS (Secure Sockets Layer/Transport Layer Security) protocols have been widely used
in data transmission to protect the security and integrity of the data. However, due to the …
in data transmission to protect the security and integrity of the data. However, due to the …
Reliable and Trustworthy IoT Networks
M Zang - 2023 - orbit.dtu.dk
The concept of the Internet of Things (IoT) has evolved significantly due to advancements
like 5G communication, edge computing, and the proliferation of IoT devices. These …
like 5G communication, edge computing, and the proliferation of IoT devices. These …
Network security monitoring and analysis based on big data technologies
B Li - 2013 - scholarworks.unr.edu
Network flow data provide valuable information to understand the network state and to be
aware of the network security threats. However, processing the large amount of data …
aware of the network security threats. However, processing the large amount of data …
Изучение пользовательской аудитории для задач сетевой безопасности
АВ Баскаков, ЕС Сагатов, АМ Сухов - Информационная …, 2014 - cyberleninka.ru
Статья посвящена изучению аудитории интернет-сервисов с целью формирования
пользовательского ядра в виде списка IP-адресов, для которых можно разрешить …
пользовательского ядра в виде списка IP-адресов, для которых можно разрешить …