2018 15th International ISC (Iranian Society of Cryptology) Conference on Information Security and Cryptology (ISCISC) 2018
DOI: 10.1109/iscisc.2018.8546856
|View full text |Cite
|
Sign up to set email alerts
|

An efficient user identification approach based on Netflow analysis

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(4 citation statements)
references
References 3 publications
0
4
0
Order By: Relevance
“…The CTU- 13 After observing the results from the Weka and R Studio tools it is concluded that Weka is better compared to R Studio for classification of NetFlows. The J48 and RF algorithms were used on CTU-13 and PantHoney dataset for classification.…”
Section: Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…The CTU- 13 After observing the results from the Weka and R Studio tools it is concluded that Weka is better compared to R Studio for classification of NetFlows. The J48 and RF algorithms were used on CTU-13 and PantHoney dataset for classification.…”
Section: Discussionmentioning
confidence: 99%
“…These methods are not practically feasible because they have not the capacity to process a large amount of traffic. The authors have used data captured from their own setup and after applying the RF technique got the accuracy of 94.60% [13]. Jiangpan et al…”
Section: Related Workmentioning
confidence: 99%
“…When the routers are utilized, the NetFlow can generate NetFlow records. NetFlow collector utilized to group the records data, which are exported from the router, then process it to perform the traffic analysis and presentation in simple format [24].NetFlow has the switching feature, which helps to export it UDP or SCTP protocols. NetFlow utilized for:  Provide aggregation features using the NetFlow collector.…”
Section: ) Netflowmentioning
confidence: 99%
“…Bakhshandeh et al [19] showed that identifying the users based on their behavior instead of IP addresses is vital since the dynamic assignation of addresses can easily avoid security mechanisms. The authors proposed a method for efficient user identification method that is based on NetFlow traffic flows.…”
Section: Related Workmentioning
confidence: 99%