Towards the deployment of machine learning solutions in network traffic classification: A systematic survey

F Pacheco, E Exposito, M Gineste… - … Surveys & Tutorials, 2018 - ieeexplore.ieee.org
Traffic analysis is a compound of strategies intended to find relationships, patterns,
anomalies, and misconfigurations, among others things, in Internet traffic. In particular, traffic …

Toward a monitoring and threat detection system based on stream processing as a virtual network function for big data

M Andreoni Lopez, DMF Mattos… - Concurrency and …, 2019 - Wiley Online Library
The late detection of security threats causes a significant increase in the risk of irreparable
damages and restricts any defense attempt. In this paper, we propose a sCAlable TRAffic …

Self-adaptive decentralized monitoring in software-defined networks

G Tangari, D Tuncer, M Charalambides… - … on Network and …, 2018 - ieeexplore.ieee.org
The software-defined networking (SDN) paradigm can allow network management solutions
to automatically and frequently reconfigure network resources. When developing SDN …

DeepWindow: An efficient method for online network traffic anomaly detection

Z Shi, J Li, C Wu, J Li - … Conference on Smart City; IEEE 5th …, 2019 - ieeexplore.ieee.org
With the explosion of network traffic volume, high efficient and large-scale network traffic
anomaly detection methods becomes necessary. However, existing methods often fail to …

[HTML][HTML] TONTA: Trend-based online network traffic analysis in ad-hoc IoT networks

A Shahraki, A Taherkordi, Ø Haugen - Computer Networks, 2021 - Elsevier
Abstract Internet of Things (IoT) refers to a system of interconnected heterogeneous smart
devices communicating without human intervention. A significant portion of existing IoT …

Deepddos: Online ddos attack detection

Z Shi, J Li, C Wu - 2019 IEEE Global Communications …, 2019 - ieeexplore.ieee.org
Highly efficient and dependable large-scale DDoS attack detection scheme is critical for
network anomaly detection. Typical machine learning algorithms such as Decision Tree and …

A threat monitoring system for intelligent data analytics of network traffic

LCB Guimaraes, GAF Rebello, GF Camilo… - Annals of …, 2022 - Springer
Security attacks have been increasingly common and cause great harm to people and
organizations. Late detection of such attacks increases the possibility of irreparable damage …

Flow monitoring system for IoT networks

L Santos, C Rabadão, R Gonçalves - New Knowledge in Information …, 2019 - Springer
The big number of Internet of Things (IoT) devices, the lack of interoperability and the low
accessibility of many of them in a vast heterogenous landscape will make it very hard to …

Blockchained adaptive federated auto metalearning BigData and DevOps CyberSecurity Architecture in Industry 4.0

K Demertzis, L Iliadis, E Pimenidis, N Tziritas… - … Applications of Neural …, 2021 - Springer
Maximizing the production process in modern industry, as proposed by Industry 4.0, requires
extensive use of Cyber-Physical Systems (CbPS). Artificial intelligence technologies …

Normalization of unstructured log data into streams of structured event objects

D Tovarňák, T Pitner - 2019 IFIP/IEEE Symposium on Integrated …, 2019 - ieeexplore.ieee.org
Monitoring plays a crucial role in the operation of any sizeable distributed IT infrastructure.
Whether it is a university network or cloud datacenter, monitoring information is continuously …