2009 International Conference on Networks Security, Wireless Communications and Trusted Computing 2009
DOI: 10.1109/nswctc.2009.237
|View full text |Cite
|
Sign up to set email alerts
|

A Network Misuse Detection Mechanism Based on Traffic Log

Abstract: Setting up a large number of network connections and using up a lot of bandwidth are usually regarded as a network misuse behavior. It is significance for the network supervision to find and recognize these behaviors timely and correctly. This paper proposes a network misuse detection mechanism based on traffic log, combining the payload independent traffic classification technology. Through this mechanism, we can complete the selection of behavior features, and overcome the problems for both sample insufficie… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2013
2013
2021
2021

Publication Types

Select...
2
2
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(1 citation statement)
references
References 13 publications
0
1
0
Order By: Relevance
“…The traditional intrusion detection algorithms 4 mainly include: misuse detection and anomaly detection. Misuse detection [5][6][7] is to determine whether an event is an intrusion behavior by determining a set of rules. It has high accuracy and low false detection rate (FDR), but the deficiency is that it cannot detect unknown attacks.…”
Section: Introductionmentioning
confidence: 99%
“…The traditional intrusion detection algorithms 4 mainly include: misuse detection and anomaly detection. Misuse detection [5][6][7] is to determine whether an event is an intrusion behavior by determining a set of rules. It has high accuracy and low false detection rate (FDR), but the deficiency is that it cannot detect unknown attacks.…”
Section: Introductionmentioning
confidence: 99%