Why are my flows different? a tutorial on flow exporters
Network flows build the basis of modern network data analysis by aggregating properties of
network packets with common characteristics. A consistent and unambiguous definition of …
network packets with common characteristics. A consistent and unambiguous definition of …
Better safe than sorry: Risk Management based on a safety-augmented Network Intrusion Detection System
Interconnected industrial control system (ICS) networks based on routable protocols are
susceptible to remote attacks similar to classical information technology (IT) networks …
susceptible to remote attacks similar to classical information technology (IT) networks …
A Survey of Encrypted Malicious Traffic Detection
Y Li, H Guo, J Hou, Z Zhang, T Jiang… - … , and Informatics (CCCI), 2021 - ieeexplore.ieee.org
With more and more encrypted traffic such as HTTPS, encrypted traffic protects not only
normal traffic, but also malicious traffic. Identification of encrypted malicious traffic without …
normal traffic, but also malicious traffic. Identification of encrypted malicious traffic without …
Analysis of lightweight feature vectors for attack detection in network traffic
F Meghdouri, T Zseby, F Iglesias - Applied Sciences, 2018 - mdpi.com
Featured Application Optimal design of feature vectors for early-phase attack detection in
large communication networks. Abstract The consolidation of encryption and big data in …
large communication networks. Abstract The consolidation of encryption and big data in …
Extreme dimensionality reduction for network attack visualization with autoencoders
The visualization of network traffic flows is an open problem that affects the control and
administration of communication networks. Feature vectors used for representing traffic …
administration of communication networks. Feature vectors used for representing traffic …
基于深度学习的加密恶意流量检测研究
翟明芳, 张兴明, 赵博 - 网络与信息安全学报, 2020 - infocomm-journal.com
随着网络安全防范意识增强, 加密通信占据主流, 加密流量快速增长. 流量加密在保护隐私的同时
, 也掩饰非法企图, 改变威胁形式. 深度学习作为机器学习领域的重要分支 …
, 也掩饰非法企图, 改变威胁形式. 深度学习作为机器学习领域的重要分支 …
NTARC: a data model for the systematic review of network traffic analysis research
The increased interest in secure and reliable communications has turned the analysis of
network traffic data into a predominant topic. A high number of research papers propose …
network traffic data into a predominant topic. A high number of research papers propose …
Thoughts and recommendations from the acm sigcomm 2017 reproducibility workshop
Ensuring the reproducibility of results is an essential part of experimental sciences, including
computer networking. Unfortunately, as highlighted recently, a large portion of research …
computer networking. Unfortunately, as highlighted recently, a large portion of research …
Cyber-security research by ISPs: a NetFlow and DNS anonymization policy
M Fejrskov, JM Pedersen… - … Conference on Cyber …, 2020 - ieeexplore.ieee.org
Internet Service Providers (ISPs) have an economic and operational interest in detecting
malicious network activity relating to their subscribers. However, it is unclear what kind of …
malicious network activity relating to their subscribers. However, it is unclear what kind of …
Are network attacks outliers? a study of space representations and unsupervised algorithms
Among network analysts,“anomaly” and “outlier” are terms commonly associated to network
attacks. Attacks are outliers (or anomalies) in the sense that they exploit communication …
attacks. Attacks are outliers (or anomalies) in the sense that they exploit communication …