Application-Level Traffic Identification of Network Security Monitoring

Author(s):  
Zhenbiao Lin ◽  
Xingyuan Chen ◽  
Yongwei Wang
IEEE Network ◽  
2019 ◽  
Vol 33 (2) ◽  
pp. 126-131 ◽  
Author(s):  
Raniere Rocha Guimaraes ◽  
Leandro A. Passos ◽  
Raimir Holanda Filho ◽  
Victor Hugo C. de Albuquerque ◽  
Joel J. P. C. Rodrigues ◽  
...  

IEEE Access ◽  
2019 ◽  
Vol 7 ◽  
pp. 108304-108315 ◽  
Author(s):  
James Halvorsen ◽  
Jesse Waite ◽  
Adam Hahn

2020 ◽  
pp. 1-1 ◽  
Author(s):  
Marija Furdek ◽  
Carlos Natalino ◽  
Fabian Lipp ◽  
David Hock ◽  
Andrea Di Giglio ◽  
...  

2014 ◽  
Vol 977 ◽  
pp. 511-514
Author(s):  
Li Ping Huo ◽  
Xia Xu ◽  
Wei Wei Yao

The purpose of data analysis is to compress the data extraction, given its simplicity general description. In this paper, the dynamic attack traffic data, trying to establish in the metropolitan traffic monitoring data, according to the abnormal test, hypothesis testing and other methods of attack traffic identification and reasonable analysis, we found the type of attack traffic and network data from a wide range of macro-and related features, in order to provide a basis for analytical methods and techniques of network security data.


Sign in / Sign up

Export Citation Format

Share Document