[图书][B] The state of the art in intrusion prevention and detection

ASK Pathan - 2014 - api.taylorfrancis.com
Most of the security threats in various communications networks are posed by the illegitimate
entities that enter or intrude within the network perimeter, which could commonly be termed …

Application‐level traffic monitoring and an analysis on IP networks

MS Kim, YJ Won, JWK Hong - ETRI journal, 2005 - Wiley Online Library
Traditional traffic identification methods based on well‐known port numbers are not
appropriate for the identification of new types of Internet applications. This paper proposes a …

Flow-based anomaly intrusion detection system using two neural network stages

Y Abuadlla, G Kvascev, S Gajin… - Computer Science and …, 2014 - doiserbia.nb.rs
Computer systems and networks suffer due to rapid increase of attacks, and in order to keep
them safe from malicious activities or policy violations, there is need for effective security …

A framework for real-time worm attack detection and backbone monitoring

T Dubendorfer, A Wagner… - First IEEE International …, 2005 - ieeexplore.ieee.org
We developed an open source Internet backbone monitoring and traffic analysis framework
named UPFrame. It captures UDP NetFlow packets, buffers it in shared memory and feeds it …

A method on multimedia service traffic monitoring and analysis

HJ Kang, MS Kim, JWK Hong - International Workshop on Distributed …, 2003 - Springer
The use of multimedia service applications is growing rapidly on the Internet. These
applications are generating a huge volume of network traffic, which has a great impact on …

Anomaly characterization in flow-based traffic time series

A Sperotto, R Sadre, A Pras - IP Operations and Management: 8th IEEE …, 2008 - Springer
The increasing number of network attacks causes growing problems for network operators
and users. Not only do these attacks pose direct security threats to our infrastructure, but …

Streaming media and multimedia conferencing traffic analysis using payload examination

HJ Kang, MS Kim, JW Hong - ETRI journal, 2004 - Wiley Online Library
This paper presents a method and architecture to analyze streaming media and multimedia
conferencing traffic. Our method is based on detecting the transport protocol and port …

[图书][B] Impact analysis, early detection and mitigation of large-scale Internet attacks

T Dübendorfer - 2005 - research-collection.ethz.ch
Internet security development lags far behind the unprecedented rapid growth of the
Internet, which is currently approaching one billion users worldwide. Network operators and …

[PDF][PDF] Bandwidth management and monitoring for ip network traffic: An investigation

BVW Irwin - 2001 - homes.cs.ru.ac.za
Bandwidth management is a topic which is often discussed, but on which relatively little work
has been done with regard to compiling a comprehensive set of techniques and methods for …

Flow Based Intrusion Detection System Using Multistage Neural Network

Y Abuadlla, OB Taher, H Elzentani - مجلة الجامعة الأسمرية, 2017‎ - journals.asmarya.edu.ly
Flow Based Intrusion Detection System Using Multistage Neural Network Page 1 ةيرمسلأا
ةعماجلا ةلجم :ا ةيقيبطتلاو ةيساسلأا مولعل ( دلجملا 2 ( ددعلا ) 2 ربمسيد ،) 2017 م 77 Flow Based …