2012
DOI: 10.1007/978-3-642-30633-4_13
|View full text |Cite
|
Sign up to set email alerts
|

Real-Time and Resilient Intrusion Detection: A Flow-Based Approach

Abstract: Abstract. Flow-based intrusion detection will play an important role in high-speed networks, due to the stringent performance requirements of packet-based solutions. Flow monitoring technologies, such as NetFlow or IPFIX, aggregate individual packets into flows, requiring new intrusion detection algorithms to deal with the aggregated data. These algorithms are subject to constraints on real-time and accurate detection of intrusions, due to the nature of current flow monitoring technologies. In this paper, we p… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2013
2013
2018
2018

Publication Types

Select...
4
1
1

Relationship

2
4

Authors

Journals

citations
Cited by 7 publications
(4 citation statements)
references
References 11 publications
0
4
0
Order By: Relevance
“…A flow is the fundamental object of the TIC research field. It has also received some attention in IDS literature recently [6,9,10]; in [28], the authors provided an overview of flow-based IDS.…”
Section: Literature Reviewmentioning
confidence: 99%
“…A flow is the fundamental object of the TIC research field. It has also received some attention in IDS literature recently [6,9,10]; in [28], the authors provided an overview of flow-based IDS.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Deep Packet Inspection. In high-speed networks flow-level monitoring is increasingly outracing packet-based analysis because the monitoring systems lack processing power and storage capacity necessary for a deep packet inspection for the corresponding data rates [4]. While flow-level analysis is intended to handle huge data rates by abstracting from detailed packet data, this limitation is neither required nor suitable for analyzing automation data due to the following reasons.…”
Section: Problem Definitionmentioning
confidence: 99%
“…These applications operate on flow data exported by flow exporters and collected by flow collectors. Since the export of flow data is heavily based on timeouts and the collection is often designed to work in time intervals of several minutes, analysis applications are subject to various delays in the detection process [8]. Especially in the case of DDoS attack detection, where overload of network infrastructure can happen very quickly, this is something that must be avoided.…”
Section: Introductionmentioning
confidence: 99%