K Bartos, M Rehak - Traffic Monitoring and Analysis: 4th International …, 2012 - Springer
With increasing amount of network traffic, sampling techniques have become widely employed allowing monitoring and analysis of high-speed network links. Despite of all …
J He, Y Yang, X Wang, Z Tan - International Journal of Network …, 2017 - Wiley Online Library
Summary Peer‐to‐peer (P2P) botnets have become one of the major threats to network security. Most existing botnet detection systems detect bots by examining network traffic …
K Bartos, M Rehak - International Journal of Network …, 2015 - Wiley Online Library
In order to cope with an increasing volume of network traffic, flow sampling methods are deployed to reduce the volume of log data stored for monitoring, attack detection and …
Anomaly-based systems have become critical to the fields of information technology. Since last few years, evolution of anomaly-based intrusion detection system (IDS), improving …
In recent years, flow-based anomaly detection has attracted considerable attention from many researchers and some methods have been proposed to improve its accuracy …
S Yin, S Li, J Yin - 2009 5th International Conference on …, 2009 - ieeexplore.ieee.org
As the wireless services developed rapidly in the recent years, a diversity of wireless services emerge such that radio environment becomes more and more complicated. Radio …
EG Bakhoum - EURASIP Journal on Information Security, 2011 - Springer
Recent experimental work by Androulidakis and Papavassiliou (IET Commun 2 (3): 399, 2008; IEEE Netw 23 (1): 6, 2009) has shown that it is possible to maintain a high level of …
Modern Internet has enabled wider usage, resulting in increased network traffic. Due to the high volume of data packets in networking, sampling techniques are widely used in flow …
This book supplies an unprecedented look at the latest research on the networking and communication aspects of Big Data. Starting with a comprehensive introduction to Big Data …