2017
DOI: 10.1016/j.comcom.2016.12.007
|View full text |Cite
|
Sign up to set email alerts
|

Deep IP flow inspection to detect beyond network anomalies

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
15
0
3

Year Published

2018
2018
2023
2023

Publication Types

Select...
6
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 30 publications
(18 citation statements)
references
References 24 publications
0
15
0
3
Order By: Relevance
“…Another important variant of parameterized entropy, i.e., Tsallis entropy, is utilized by researchers for anomaly detection. A feature-based Anomaly Detection System (ADS) using Tsallis entropy at device level is proposed in [23] and is capable of detecting and classifying known and unknown anomalies with additional information regarding network usage. Primitive properties of flows like SA, DA, SP, and DP and derived flow properties at device and network level, i.e., out-degree, in-degree, per flow, per packet, per byte, packet per sample (pps), etc., are used in flow extraction process.…”
Section: Literature Reviewmentioning
confidence: 99%
See 2 more Smart Citations
“…Another important variant of parameterized entropy, i.e., Tsallis entropy, is utilized by researchers for anomaly detection. A feature-based Anomaly Detection System (ADS) using Tsallis entropy at device level is proposed in [23] and is capable of detecting and classifying known and unknown anomalies with additional information regarding network usage. Primitive properties of flows like SA, DA, SP, and DP and derived flow properties at device and network level, i.e., out-degree, in-degree, per flow, per packet, per byte, packet per sample (pps), etc., are used in flow extraction process.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Static thresholds need to be reconfigured on changing network conditions to adjust for high DR and low FPR and that makes it unsuitable for SG. Moreover, Shannon entropy provides low DR and FPR as compared to Tsallis entropy [23] and on detection of DDoS attack, it is important to mitigate it as well to prevent its penetration further in the network; that is missing in DDoS protection approaches. In order to improve the security and reliability of SG in reference to DDoS attacks, researchers have suggested an SDN-based approach to handle the glitches in the conventional network paradigms.…”
Section: Motivation and Problem Statementmentioning
confidence: 99%
See 1 more Smart Citation
“…Para contornar esta questão, considerou-se neste trabalho uma base de dados com 95 GB de pacotes capturados do laboratório do Grupo de Teleinformática e Automação (GTA) da Universidade Federal do Rio de Janeiro (UFRJ), contendo tráfego normal e ataques de rede reais divididos em duas principais classes: Denial of Service (DoS) e Probe [Lobato et al 2016 A base de dados é um dos fatores que determinam quais os tipos de ataques serão detectados, implicando também na escalabilidade, que deve ser levada em consideração para a implantação da solução em grandes redes [Amaral et al 2017]. Portanto, todos os pacotes com comportamento normal foram convertidos para fluxos IP com base no padrão Netflow através da ferramenta Nfpcapd considerando uma janela temporal de 60 segundos.…”
Section: Base De Dadosunclassified
“…Due to various new users, new devices and new applications constantly connecting to the network, network service has been widely applied in all fields [1]. With the rapid development of the network, different anomalies and attacks occur frequently, which produces great damages to network performance and security [2]. Facing this situation, multiple security mechanisms, such as antivirus software, firewall technology, user authentication and access control [3], have been designed and applied to prevent abnormal behaviors and detect potential risks [4].…”
Section: Introductionmentioning
confidence: 99%