Real-time analysis of flow data for network attack detection

G Munz, G Carle - … 10th IFIP/IEEE International Symposium on …, 2007 - ieeexplore.ieee.org
With the wide deployment of flow monitoring in IP networks, the analysis of the exported flow
data has become an important research area. It has been shown that flow data can be used …

Mynet: A platform for secure p2p personal and social networking services

DN Kalofonos, Z Antoniou, FD Reynolds… - 2008 Sixth Annual …, 2008 - ieeexplore.ieee.org
Recent advances in peer-to-peer (P2P) technologies will enable users to establish
ubiquitous connectivity among their personal networked devices and those of others …

Collaborative anomaly-based detection of large-scale internet attacks

T Gamer - Computer Networks, 2012 - Elsevier
The Internet infrastructure and Internet-based business today still suffer from various attacks
like Distributed Denial-of-Service (DDoS) attacks or worm propagations. A necessary first …

Traffic anomaly detection and cause identification using flow-level measurements

G Münz - 2010 - mediatum.ub.tum.de
This dissertation deals with the detection of Internet traffic anomalies in flow-level
measurement data as well as the identification of their causes. The detection of traffic …

Adaptive response system for distributed denial-of-service attacks

VLL Thing, M Sloman, N Dulay - 2009 IFIP/IEEE International …, 2009 - ieeexplore.ieee.org
This dissertation presents a distributed denial-of-service adaptive response (DARE) system,
capable of executing appropriate detection and mitigation responses automatically and …

[PDF][PDF] globalizing internet security with A distributed firewall and active response architecture

L Thames - 2008 - Citeseer
The Internet, one of the largest engineered systems ever deployed, has become a crucial
technology for our society. It has changed the way people perform many of their daily …

[PDF][PDF] Advancing cyber security with a semantic path merger packet classification algorithm

JL Thames - 2012 - researchgate.net
Internet security continues to be a complex and challenging problem. Security mechanisms
such as authentication, data integrity, and data confidentiality services along with intrusion …

[PDF][PDF] Vizualizace síťových bezpečnostních událostí

P Stehlík - Bakalářská práce. Brno: Vysoké učení technické v Brně …, 2016 - core.ac.uk
This thesis focuses on visualization of network security events via modern web technologies.
Multiple technologies for creating modern web application supporting visualising large …

[图书][B] Dezentrale, anomalie-basierte Erkennung verteilter Angriffe im Internet

T Gamer - 2010 - books.google.com
Die mittlerweile unabdingbare Verfügbarkeit des Internets wird zunehmend durch finanziell
motivierte, verteilte Angriffe gestört. Deren schnelle und flächendeckende Erkennung als …

Early abnormal overload detection and the solution on content delivery network

CN Tan, SD Truong, TC Dang - Innovations in Computing Sciences and …, 2010 - Springer
From articles of H. Yu Chen about early detection of network attacks [1], the authors applied
his approach to Early Abnormal Overload Detection (EAOD) on Content Delivery Network …