2021
DOI: 10.1109/tnsm.2020.3036528
|View full text |Cite
|
Sign up to set email alerts
|

Host Behavior in Computer Network: One-Year Study

Abstract: An analysis of a host behavior is an essential key for modern network management and security. A robust behavior profile enables the network managers to detect anomalies with high accuracy, predict the host behavior, or group host to clusters for better management. Hence, host profiling methods attract the interest of many researchers, and novel methods for host profiling are being introduced. However, these methods are frequently developed on preprocessed and small datasets. Therefore, they do not reflect the… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
3

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(3 citation statements)
references
References 31 publications
0
3
0
Order By: Relevance
“…In five of the six cases, we were also able to identify one domain expert per dataset (see Section 3.3) from the start of the abstractions process. Only for the host behavior case, we initially reused a dataset (and tasks) of a scientific publication [52], and conducted the expert cast and winnow stages [89] later. To design a data-centric but domain-agnostic visualization tool that helps to solve problems encountered by experts across different domains, we engaged with the experts early in the process to learn more about their domain context, usage of the data, current tool usage, problems, and challenges, to identify design targets and determine appropriate validation strategies [77].…”
Section: Methodological Processmentioning
confidence: 99%
See 1 more Smart Citation
“…In five of the six cases, we were also able to identify one domain expert per dataset (see Section 3.3) from the start of the abstractions process. Only for the host behavior case, we initially reused a dataset (and tasks) of a scientific publication [52], and conducted the expert cast and winnow stages [89] later. To design a data-centric but domain-agnostic visualization tool that helps to solve problems encountered by experts across different domains, we engaged with the experts early in the process to learn more about their domain context, usage of the data, current tool usage, problems, and challenges, to identify design targets and determine appropriate validation strategies [77].…”
Section: Methodological Processmentioning
confidence: 99%
“…In the Host Behavior case, we analyzed a publicly available dataset of network flows collected by Jirsik and Velan in their 2021 host behavior study [52]. The dataset on the communications flow of a university network consists of 348,574 time-stamped ingress (incoming) and egress (outgoing) communication events.…”
Section: Host Behavior In a Computer Networkmentioning
confidence: 99%
“…To evade detection and blocking of C&C addresses, they are leveraging both host-based and network-based evasion tactics, along with the use of steganography for updating the IP addresses of C&C servers used by malware [6]. Traditional defense mechanisms primarily focus on network-based and signaturebased virus monitoring [7]. However, these methods fall short in effectively intercepting and defending against such threats.…”
Section: Related Workmentioning
confidence: 99%