[HTML][HTML] A survey on network data collection
D Zhou, Z Yan, Y Fu, Z Yao - Journal of Network and Computer …, 2018 - Elsevier
Networks have dramatically changed our daily life and infiltrated all aspects of human
society. At the same time when we enjoy the convenience and benefits brought by the …
society. At the same time when we enjoy the convenience and benefits brought by the …
A semantics aware approach to automated reverse engineering unknown protocols
Extracting the protocol message format specifications of unknown applications from network
traces is important for a variety of applications such as application protocol parsing …
traces is important for a variety of applications such as application protocol parsing …
A semantics-aware approach to the automated network protocol identification
Traffic classification, a mapping of traffic to network applications, is important for a variety of
networking and security issues, such as network measurement, network monitoring, as well …
networking and security issues, such as network measurement, network monitoring, as well …
Improved KNN algorithm for fine-grained classification of encrypted network flow
C Ma, X Du, L Cao - Electronics, 2020 - mdpi.com
The fine-grained classification of encrypted traffic is important for network security analysis.
Malicious attacks are usually encrypted and simulated as normal application or content …
Malicious attacks are usually encrypted and simulated as normal application or content …
Classification of VPN network traffic flow using time related features on Apache Spark
This paper classifies the VPN network traffic flow using the time related features on the
Apache Spark and artificial neural networks. Today's, internet traffic is encrypted using …
Apache Spark and artificial neural networks. Today's, internet traffic is encrypted using …
System, method and computer-accessible medium for network intrusion detection
An exemplary system, method and computer-accessible medium for determining a starting
point of a header field (s) in a network packet (s) can be provided, which can include, for …
point of a header field (s) in a network packet (s) can be provided, which can include, for …
Detecting anomalous behavior in VoIP systems: A discrete event system modeling
D Golait, N Hubballi - IEEE Transactions on Information …, 2016 - ieeexplore.ieee.org
Session initiation protocol (SIP) is an application layer protocol used for signaling purposes
to manage voice over IP connections. SIP being a text-based protocol is vulnerable to a …
to manage voice over IP connections. SIP being a text-based protocol is vulnerable to a …
Novel dynamic multiple classification system for network traffic
Traffic classification has been widely used in networking and security issues. Previous works
have involved many different techniques for mapping traffic to the application. However, little …
have involved many different techniques for mapping traffic to the application. However, little …
DPFEE: A high performance scalable pre-processor for network security systems
Network Intrusion Detection Systems (NIDS) and Anti-Denial-of-Service (DoS) employ Deep
Packet Inspection (DPI) which provides visibility to the content of payload to detect network …
Packet Inspection (DPI) which provides visibility to the content of payload to detect network …
Programming network stack for middleboxes with Rubik
Middleboxes are becoming indispensable in modern networks. However, programming the
network stack of middleboxes to support emerging transport protocols and flexible stack …
network stack of middleboxes to support emerging transport protocols and flexible stack …