2018
DOI: 10.1007/978-981-10-7245-1_33
|View full text |Cite
|
Sign up to set email alerts
|

Characterizing Network Flows for Detecting DNS, NTP, and SNMP Anomalies

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
2
1
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(2 citation statements)
references
References 4 publications
0
2
0
Order By: Relevance
“…Since these anomalies are not very common, they are difficult to analyze and detect. The flow, bytes, packet size, and bits/second do the same [40]. DNS queries Packet spoofing is abnormal behavior in the DNS protocol [41].…”
Section: ) Zero-day Vulnerabilitymentioning
confidence: 97%
“…Since these anomalies are not very common, they are difficult to analyze and detect. The flow, bytes, packet size, and bits/second do the same [40]. DNS queries Packet spoofing is abnormal behavior in the DNS protocol [41].…”
Section: ) Zero-day Vulnerabilitymentioning
confidence: 97%
“…The proposed model achieved high precision in the identification and detection of Malicious Traffic at a low false-negative rate at a rate of 98.3%. Sharma et al [34]showed that the analysis of the volume could not detect sorts of network abnormalities entirely.…”
Section: Related Workmentioning
confidence: 99%