[HTML][HTML] A survey on network data collection

D Zhou, Z Yan, Y Fu, Z Yao - Journal of Network and Computer …, 2018 - Elsevier
Networks have dramatically changed our daily life and infiltrated all aspects of human
society. At the same time when we enjoy the convenience and benefits brought by the …

A semantics aware approach to automated reverse engineering unknown protocols

Y Wang, X Yun, MZ Shafiq, L Wang… - 2012 20th IEEE …, 2012 - ieeexplore.ieee.org
Extracting the protocol message format specifications of unknown applications from network
traces is important for a variety of applications such as application protocol parsing …

A semantics-aware approach to the automated network protocol identification

X Yun, Y Wang, Y Zhang, Y Zhou - IEEE/ACM transactions on …, 2015 - ieeexplore.ieee.org
Traffic classification, a mapping of traffic to network applications, is important for a variety of
networking and security issues, such as network measurement, network monitoring, as well …

Improved KNN algorithm for fine-grained classification of encrypted network flow

C Ma, X Du, L Cao - Electronics, 2020 - mdpi.com
The fine-grained classification of encrypted traffic is important for network security analysis.
Malicious attacks are usually encrypted and simulated as normal application or content …

Classification of VPN network traffic flow using time related features on Apache Spark

SA Aswad, E Sonuç - 2020 4th International Symposium on …, 2020 - ieeexplore.ieee.org
This paper classifies the VPN network traffic flow using the time related features on the
Apache Spark and artificial neural networks. Today's, internet traffic is encrypted using …

System, method and computer-accessible medium for network intrusion detection

SK Addepalli, R Karri, V Jyothi - US Patent 10,735,438, 2020 - Google Patents
An exemplary system, method and computer-accessible medium for determining a starting
point of a header field (s) in a network packet (s) can be provided, which can include, for …

Detecting anomalous behavior in VoIP systems: A discrete event system modeling

D Golait, N Hubballi - IEEE Transactions on Information …, 2016 - ieeexplore.ieee.org
Session initiation protocol (SIP) is an application layer protocol used for signaling purposes
to manage voice over IP connections. SIP being a text-based protocol is vulnerable to a …

Novel dynamic multiple classification system for network traffic

X Xiao, R Li, HT Zheng, R Ye, A KumarSangaiah… - Information …, 2019 - Elsevier
Traffic classification has been widely used in networking and security issues. Previous works
have involved many different techniques for mapping traffic to the application. However, little …

DPFEE: A high performance scalable pre-processor for network security systems

V Jyothi, SK Addepalli, R Karri - IEEE Transactions on Multi …, 2017 - ieeexplore.ieee.org
Network Intrusion Detection Systems (NIDS) and Anti-Denial-of-Service (DoS) employ Deep
Packet Inspection (DPI) which provides visibility to the content of payload to detect network …

Programming network stack for middleboxes with Rubik

H Li, C Wu, G Sun, P Zhang, D Shan, T Pan… - 18th USENIX Symposium …, 2021 - usenix.org
Middleboxes are becoming indispensable in modern networks. However, programming the
network stack of middleboxes to support emerging transport protocols and flexible stack …