2017 1st Cyber Security in Networking Conference (CSNet) 2017
DOI: 10.1109/csnet.2017.8241999
|View full text |Cite
|
Sign up to set email alerts
|

Collecting and characterizing a real broadband access network traffic dataset

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
8
0
8

Year Published

2018
2018
2024
2024

Publication Types

Select...
5
1
1

Relationship

2
5

Authors

Journals

citations
Cited by 18 publications
(18 citation statements)
references
References 18 publications
0
8
0
8
Order By: Relevance
“…Network traffic is abstracted in 26 features and contains three classes, DoS, probe, and normal traffic. The third dataset is the NetOp, a real dataset from a Brazilian operator . The dataset contains anonymized access traffic of 373 broadband users of the South Zone of the city of Rio de Janeiro.…”
Section: Catraca Evaluationmentioning
confidence: 99%
See 1 more Smart Citation
“…Network traffic is abstracted in 26 features and contains three classes, DoS, probe, and normal traffic. The third dataset is the NetOp, a real dataset from a Brazilian operator . The dataset contains anonymized access traffic of 373 broadband users of the South Zone of the city of Rio de Janeiro.…”
Section: Catraca Evaluationmentioning
confidence: 99%
“…With big dataset, a computer cluster must be used to introduce low latency when processing the data. A previous work analyzed just one day of the network traffic. In this paper, we analyze the entire dataset, in total of one full week.…”
Section: Catraca Evaluationmentioning
confidence: 99%
“…The attack data were obtained from the data collected by Garcia et al in a study on the behavior of botnets [24]. The dataset consists of flows identified by a tuple composed of the source and destination IP address, source and destination transport ports, and transport protocol [25]. Our compiled dataset counts with traffic from 15 devices both from captured laboratory usage traffic and the botnet dataset.…”
Section: Virtual Network Function Performancementioning
confidence: 99%
“…We added 10 new features into the dataset, that marks if the flow belongs to the specific service. It is important to use tagging features to keep some information about the service whereas we still are able to calculate correlation and to apply the principal components analysis over the dataset [25]. Figure 5a compares the accuracy of three classification algorithms: probabilistic neural network (PNN); multilayer perceptron neural network (MLP) and Boosted Decision Trees [26].…”
Section: Virtual Network Function Performancementioning
confidence: 99%
“…Os perfis podem apontar usos característicos de determinadas aplicações [Shye et al, 2010] e o quanto de recursosé consumido por cada aplicação [Qian et al, 2011]. Contudo, em trabalhos anteriores a busca por padrões de uso de aplicações ou padrões de uso de recursos de rede são realizadas de forma supervisionada, istoé, conjuntos de dados característicos de cada aplicação são usados para treinar um classificador capaz de reconhecer os padrões em um conjunto de dados de teste [Andreoni Lopez et al, 2017]. Ao identificar padrões anteriormente ocultos de uso da redeé possível extrair não somente conhecimento a respeito do funcionamento da rede [Biswas et al, 2015, Ghosh et al, 2011, mas também a respeito dos usuários, como preferências e padrões de mobilidade [Wang et al, 2014, Guo et al, 2014.…”
Section: A Inferência De Perfis De Uso Da Redeunclassified