A survey on advanced persistent threats: Techniques, solutions, challenges, and research opportunities

A Alshamrani, S Myneni, A Chowdhary… - … Surveys & Tutorials, 2019 - ieeexplore.ieee.org
Threats that have been primarily targeting nation states and their associated entities have
expanded the target zone to include the private and corporate sectors. This class of threats …

APT datasets and attack modeling for automated detection methods: A review

B Stojanović, K Hofer-Schmitz, U Kleb - Computers & Security, 2020 - Elsevier
Automated detection methods for targeted cyber attacks are getting more and more
prominent. In order to test these methods properly, it is crucial to have a suitable dataset …

Understanding the context of network traffic alerts

BCM Cappers, JJ van Wijk - 2016 IEEE Symposium on …, 2016 - ieeexplore.ieee.org
For the protection of critical infrastructures against complex virus attacks, automated network
traffic analysis and deep packet inspection are unavoidable. However, even with the use of …

Insight2: A modular visual analysis platform for network situational awareness in large-scale networks

HADE Kodituwakku, A Keller, J Gregor - Electronics, 2020 - mdpi.com
The complexity and throughput of computer networks are rapidly increasing as a result of the
proliferation of interconnected devices, data-driven applications, and remote working …

Multi-Resolution Analysis with Visualization to Determine Network Attack Patterns

DH Jeong, BK Jeong, SY Ji - Applied Sciences, 2023 - mdpi.com
Analyzing network traffic activities is imperative in network security to detect attack patterns.
Due to the complex nature of network traffic event activities caused by continuously …

SNAPS: Semantic network traffic analysis through projection and selection

BCM Cappers, JJ van Wijk - 2015 IEEE Symposium on …, 2015 - ieeexplore.ieee.org
Most network traffic analysis applications are designed to discover malicious activity by only
relying on high-level flow-based message properties. However, to detect security breaches …

On the application of compression-based metrics to identifying anomalous behaviour in web traffic

G De La Torre-Abaitua… - Logic Journal of the …, 2020 - academic.oup.com
In cybersecurity, there is a call for adaptive, accurate and efficient procedures to identifying
performance shortcomings and security breaches. The increasing complexity of both Internet …

Novel Approaches in Network Fault Management.

A Gupta, P Prabhat - International Journal of Next …, 2017 - search.ebscohost.com
As computer networks increase in size and complexity, managing them to ensure 24x7
uptime while meeting increasingly stringent Service Level Agreements (SLAs) and customer …

A service architecture using machine learning to contextualize anomaly detection

B Laughlin, K Sankaranarayanan… - Journal of Database …, 2020 - igi-global.com
This article introduces a service that helps provide context and an explanation for the outlier
score given to any network flow record selected by the analyst. The authors propose a …

Visualization tools for network security

AE Attipoe, J Yan, C Turner, D Richards - Electronic Imaging, 2016 - library.imaging.org
Network security visualization tool plays an important role in the network security filed. It's
considered the first line of defense because it provides security analysts with visualized …