Why are my flows different? a tutorial on flow exporters

G Vormayr, J Fabini, T Zseby - IEEE Communications Surveys & …, 2020 - ieeexplore.ieee.org
Network flows build the basis of modern network data analysis by aggregating properties of
network packets with common characteristics. A consistent and unambiguous definition of …

Better safe than sorry: Risk Management based on a safety-augmented Network Intrusion Detection System

B Brenner, S Hollerer, P Bhosale… - IEEE Open Journal …, 2023 - ieeexplore.ieee.org
Interconnected industrial control system (ICS) networks based on routable protocols are
susceptible to remote attacks similar to classical information technology (IT) networks …

A Survey of Encrypted Malicious Traffic Detection

Y Li, H Guo, J Hou, Z Zhang, T Jiang… - … , and Informatics (CCCI), 2021 - ieeexplore.ieee.org
With more and more encrypted traffic such as HTTPS, encrypted traffic protects not only
normal traffic, but also malicious traffic. Identification of encrypted malicious traffic without …

Analysis of lightweight feature vectors for attack detection in network traffic

F Meghdouri, T Zseby, F Iglesias - Applied Sciences, 2018 - mdpi.com
Featured Application Optimal design of feature vectors for early-phase attack detection in
large communication networks. Abstract The consolidation of encryption and big data in …

Extreme dimensionality reduction for network attack visualization with autoencoders

DC Ferreira, FI Vázquez, T Zseby - 2019 International Joint …, 2019 - ieeexplore.ieee.org
The visualization of network traffic flows is an open problem that affects the control and
administration of communication networks. Feature vectors used for representing traffic …

基于深度学习的加密恶意流量检测研究

翟明芳, 张兴明, 赵博 - 网络与信息安全学报, 2020 - infocomm-journal.com
随着网络安全防范意识增强, 加密通信占据主流, 加密流量快速增长. 流量加密在保护隐私的同时
, 也掩饰非法企图, 改变威胁形式. 深度学习作为机器学习领域的重要分支 …

NTARC: a data model for the systematic review of network traffic analysis research

F Iglesias, DC Ferreira, G Vormayr, M Bachl, T Zseby - Applied Sciences, 2020 - mdpi.com
The increased interest in secure and reliable communications has turned the analysis of
network traffic data into a predominant topic. A high number of research papers propose …

Thoughts and recommendations from the acm sigcomm 2017 reproducibility workshop

D Saucez, L Iannone - ACM SIGCOMM Computer Communication …, 2018 - dl.acm.org
Ensuring the reproducibility of results is an essential part of experimental sciences, including
computer networking. Unfortunately, as highlighted recently, a large portion of research …

Cyber-security research by ISPs: a NetFlow and DNS anonymization policy

M Fejrskov, JM Pedersen… - … Conference on Cyber …, 2020 - ieeexplore.ieee.org
Internet Service Providers (ISPs) have an economic and operational interest in detecting
malicious network activity relating to their subscribers. However, it is unclear what kind of …

Are network attacks outliers? a study of space representations and unsupervised algorithms

F Iglesias, A Hartl, T Zseby, A Zimek - Joint European Conference on …, 2019 - Springer
Among network analysts,“anomaly” and “outlier” are terms commonly associated to network
attacks. Attacks are outliers (or anomalies) in the sense that they exploit communication …