A survey of network flow applications

B Li, J Springer, G Bebis, MH Gunes - Journal of Network and Computer …, 2013 - Elsevier
It has been over 16 years since Cisco's NetFlow was patented in 1996. Extensive research
has been conducted since then and many applications have been developed. In this survey …

Flow based monitoring of ICS communication in the smart grid

P Matoušek, O Ryšavý, M Grégr, V Havlena - Journal of Information Security …, 2020 - Elsevier
A smart grid network is a part of critical infrastructure, and its interruption or blackout may
cause fatal consequences on energy production, distribution, and eventually lives of people …

Likelihood-based inference for modelling packet transit from thinned flow summaries

P Rahman, B Beranger, S Sisson… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Network traffic speeds and volumes present practical challenges to analysis. Packet thinning
and flow aggregation protocols provide smaller structured data summaries, but conversely …

Analysis of Internet service user audiences for network security problems

AM Sukhov, ES Sagatov… - 2014 IEEE 2nd …, 2014 - ieeexplore.ieee.org
In this paper an Internet service audience is studied in order to create a user kernel, with the
audience represented as a list of IP addresses able to authorize access to the beginning of a …

[PDF][PDF] Network anomaly detection using unsupervised model

P Gogoi, B Borah… - International Journal of …, 2011 - researchgate.net
Most existing network intrusion detection systems use signaturebased methods which
depend on labeled training data. This training data is usually expensive to produce due to …

A Performance Study of Flow-Based Monitoring in Internet of Vehicles

M Zang, L Dittmann, Y Yan - … on Network of the Future (NoF), 2021 - ieeexplore.ieee.org
The Internet of Vehicles (IoV) sustains the ubiquitous communications and diverse services
among vehicles throughout the Internet access, which would generate a huge volume of …

Fine-grained Identification for SSL/TLS Packets

L Kong, Y Zhou, G Huang, H Wang - International Journal of …, 2020 - airitilibrary.com
SSL/TLS (Secure Sockets Layer/Transport Layer Security) protocols have been widely used
in data transmission to protect the security and integrity of the data. However, due to the …

Reliable and Trustworthy IoT Networks

M Zang - 2023 - orbit.dtu.dk
The concept of the Internet of Things (IoT) has evolved significantly due to advancements
like 5G communication, edge computing, and the proliferation of IoT devices. These …

Network security monitoring and analysis based on big data technologies

B Li - 2013 - scholarworks.unr.edu
Network flow data provide valuable information to understand the network state and to be
aware of the network security threats. However, processing the large amount of data …

Изучение пользовательской аудитории для задач сетевой безопасности

АВ Баскаков, ЕС Сагатов, АМ Сухов - Информационная …, 2014 - cyberleninka.ru
Статья посвящена изучению аудитории интернет-сервисов с целью формирования
пользовательского ядра в виде списка IP-адресов, для которых можно разрешить …