Filters








17 Hits in 2.3 sec

SSH Compromise Detection using NetFlow/IPFIX

Rick Hofstede, Luuk Hendriks, Anna Sperotto, Aiko Pras
<span title="2014-10-10">2014</span> <i title="Association for Computing Machinery (ACM)"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/g4bof3rzarbpjigq5zxjkozv2u" style="color: black;">Computer communication review</a> </i> &nbsp;
We address this shortcoming by presenting a detection algorithm for the flow-based detection of compromises, i.e., hosts that have been compromised during an attack.  ...  Flow-based approaches for SSH intrusion detection have been developed to overcome the scalability issues of host-based alternatives.  ...  CONCLUSIONS This paper has presented a detection algorithm for the flow-based detection of hosts compromised during SSH dictionary attacks.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1145/2677046.2677050">doi:10.1145/2677046.2677050</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/v6k62n3p3zcwnoqqe4fzjcy464">fatcat:v6k62n3p3zcwnoqqe4fzjcy464</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20150918192332/http://www.sigcomm.org/sites/default/files/ccr/papers/2014/October/0000000-0000002.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/bb/51/bb51c6625414c0a66faeb9b05eb285628dc89a90.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1145/2677046.2677050"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> acm.org </button> </a>

A first look at HTTP(S) intrusion detection using NetFlow/IPFIX

Olivier van der Toorn, Rick Hofstede, Mattijs Jonker, Anna Sperotto
<span title="">2015</span> <i title="IEEE"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/5epkbpsj6fglfagfpxolfrllsi" style="color: black;">2015 IFIP/IEEE International Symposium on Integrated Network Management (IM)</a> </i> &nbsp;
In this paper, we take the first step in this direction, by presenting a network-based approach for detecting HTTP(S) dictionary attacks using NetFlow/IPFIX.  ...  This is mainly due to the impact of potential compromises resulting therefrom, and the increased load on the underlying infrastructure. The latter may even result in a Denial-of-Service (DoS).  ...  . • Compromise -Attackers have gained access to the targeted service by using correct login credentials.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/inm.2015.7140395">doi:10.1109/inm.2015.7140395</a> <a target="_blank" rel="external noopener" href="https://dblp.org/rec/conf/im/ToornHJS15.html">dblp:conf/im/ToornHJS15</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/hfiqaqpchreethdh5evjhhtqi4">fatcat:hfiqaqpchreethdh5evjhhtqi4</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20161119042851/http://annasperotto.org/papers/2015/toorn-im-2015.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/d1/06/d1062853be3c1a10fbd98d92b3674b64430ebeb9.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/inm.2015.7140395"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> ieee.com </button> </a>

Autonomic Parameter Tuning of Anomaly-Based IDSs: an SSH Case Study

Anna Sperotto, Michel Mandjes, Ramin Sadre, Pieter-Tjerk de Boer, Aiko Pras
<span title="">2012</span> <i title="Institute of Electrical and Electronics Engineers (IEEE)"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/iouxmlaqyjgpnp3dp5ddv4d2um" style="color: black;">IEEE Transactions on Network and Service Management</a> </i> &nbsp;
We validate our approach by testing it on a flow-based probabilistic detection system for the detection of SSH attacks.  ...  In this paper, we present an autonomic approach for tuning the parameters of anomaly-based intrusion detection systems in case of SSH traffic.  ...  The data our system analyzes are network flows (NetFlow/IPFIX), that in this context are defined as "a set of IP packets passing an observation point in the network during a certain time interval and having  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/tnsm.2012.031512.110146">doi:10.1109/tnsm.2012.031512.110146</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/qnvcdrbzfzcovgmpfjc36s6pwq">fatcat:qnvcdrbzfzcovgmpfjc36s6pwq</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20171109131115/https://core.ac.uk/download/pdf/11483720.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/03/8f/038f18f9f17b98f1ea436a68a61514de5a71e426.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/tnsm.2012.031512.110146"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> ieee.com </button> </a>

Learning to Detect Network Intrusion from a Few Labeled Events and Background Traffic [chapter]

Gustav Šourek, Ondřej Kuželka, Filip Železný
<span title="">2015</span> <i title="Springer International Publishing"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/2w3awgokqne6te4nvlofavy5a4" style="color: black;">Lecture Notes in Computer Science</a> </i> &nbsp;
Intrusion detection systems (IDS) analyse network traffic data with the goal to reveal malicious activities and incidents.  ...  Although there are advantages to the use of rules, they lack the basic ability of adapting to traffic data.  ...  Most of these rules can be understood as a parallel to the basic NetFlow/IPFIX aggregation features [7] , but they operate on top of the Netflow level, creating more complex aggregates with considerable  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-319-20034-7_9">doi:10.1007/978-3-319-20034-7_9</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/fsrk6txjvbcqth5coquu57u6tq">fatcat:fsrk6txjvbcqth5coquu57u6tq</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20200324203551/https://link.springer.com/content/pdf/10.1007%2F978-3-319-20034-7_9.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/41/cd/41cd1d216c039932c442d9f5ad309de4e499b57a.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-319-20034-7_9"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> springer.com </button> </a>

SD-WAN Threat Landscape [article]

Sergey Gordeychik, Denis Kolegov
<span title="2018-11-12">2018</span> <i > arXiv </i> &nbsp; <span class="release-stage" >pre-print</span>
The goal of this paper is to understand SD-WAN threats using practical approach.  ...  The provided results may be used by SD-WAN developers as a part of Secure Software Development Life Cycle (SSDLC), security researchers for penetration testing and vulnerability assessment, system integrators  ...  ., NetFlow, IPFIX) • Denial of Service The following threats are most actual regarding management plane: • Unauthorized access to management interface on the Internet Orchestration Services Service  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/1811.04583v1">arXiv:1811.04583v1</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/uca6ylumkzbqxnbuzd4jrnnzke">fatcat:uca6ylumkzbqxnbuzd4jrnnzke</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20200929183806/https://arxiv.org/ftp/arxiv/papers/1811/1811.04583.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/21/6d/216df5e2c5a26d47e5e14ed37379e0cb66b428be.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/1811.04583v1" title="arxiv.org access"> <button class="ui compact blue labeled icon button serp-button"> <i class="file alternate outline icon"></i> arxiv.org </button> </a>

Evaluating the Observability of Network Security Monitoring Strategies with TOMATO

James Halvorsen, Jesse Waite, Adam Hahn
<span title="">2019</span> <i title="Institute of Electrical and Electronics Engineers (IEEE)"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/q7qi7j4ckfac7ehf3mjbso4hne" style="color: black;">IEEE Access</a> </i> &nbsp;
Observability & Monitoring Assessment Tool), which is a platform to evaluate the effectiveness of a security monitoring strategy by exploring both the number of known adversarial techniques that can be detected  ...  Within ATT&CK, techniques represent specific technical mechanisms an attacker uses to compromise a network (e.g. Pass the Hash, SSH Hijacking, DLL Search Order Hijacking).  ...  To acquire netflow records, a switch or router is configured to record network flow records (e.g., Cisco NetFlow, IPFIX) including at least the following set of records: (i) timestamp, (ii) source IP,  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/access.2019.2933415">doi:10.1109/access.2019.2933415</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/rb7ykqhmrjheziq3vxemxrrydq">fatcat:rb7ykqhmrjheziq3vxemxrrydq</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20210427091905/https://ieeexplore.ieee.org/ielx7/6287639/8600701/08788508.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/61/93/61934385fae3c195fbbea9e4a141e6b4f379eabc.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/access.2019.2933415"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> ieee.com </button> </a>

Operational security, threat intelligence & distributed computing: the WLCG Security Operations Center Working Group

David Crooks, Liviu Vâlsan, Kashif Mohammad, Shawn McKee, Paul Clark, Adam Boutcher, Adam Padée, Michał Wójcik, Henryk Giemza, Bas Kreukniet, A. Forti, L. Betev (+3 others)
<span title="">2019</span> <i title="EDP Sciences"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/oduy4e4fvfhovftixyndrlkomi" style="color: black;">EPJ Web of Conferences</a> </i> &nbsp;
The strategy of the group is to identify necessary components - starting with threat intelligence (MISP [2]) and network intrusion detection (Bro [3]), building a working model over time.  ...  Elastiflow enables Netflow/IPFIX records to be incorporated with Elasticsearch and provides a very nice set of Kibana dashboards to visualise and track the flow data.  ...  Building on experience in the US HEP community and that of the CERN Computer Security Team, the Bro [3] network Intrusion Detection System (IDS) was selected by the WG as a starting component.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1051/epjconf/201921403029">doi:10.1051/epjconf/201921403029</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/yf3tiwn6dfhzngqubxxcijo5c4">fatcat:yf3tiwn6dfhzngqubxxcijo5c4</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20200213135755/https://www.epj-conferences.org/articles/epjconf/pdf/2019/19/epjconf_chep2018_03029.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/75/2b/752be6458b16763761cfb9d3634cfaec6f62eedb.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1051/epjconf/201921403029"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> Publisher / doi.org </button> </a>

Flow monitoring in Software-Defined Networks: Finding the accuracy/performance tradeoffs

José Suárez-Varela, Pere Barlet-Ros
<span title="">2018</span> <i title="Elsevier BV"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/blfmvfslmbggxhopuigjdb3jma" style="color: black;">Computer Networks</a> </i> &nbsp;
In OpenFlow-based Software-Defined Networks, obtaining flow-level measurements, similar to those provided by NetFlow/IPFIX, is challenging as it requires to install an entry per flow in the flow tables  ...  Additionally, flows are classified using a combination of DPI and Machine Learning (ML) techniques with special focus on the identification of web and encrypted traffic.  ...  Nowadays, one of the most deployed solutions in legacy networks for network monitoring is NetFlow/IPFIX.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1016/j.comnet.2018.02.020">doi:10.1016/j.comnet.2018.02.020</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/uu73houovrabneylv7ifgpjhti">fatcat:uu73houovrabneylv7ifgpjhti</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20200506140917/https://upcommons.upc.edu/bitstream/handle/2117/116576/comnet-postprint-version.pdf;jsessionid=9D8DCD935463835B84A8BC02ACB01B8F?sequence=4" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/f2/c9/f2c9a8e40b882c993660547af2af994f439f7084.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1016/j.comnet.2018.02.020"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> elsevier.com </button> </a>

NetFlow Datasets for Machine Learning-based Network Intrusion Detection Systems [article]

Mohanad Sarhan, Siamak Layeghy, Nour Moustafa, Marius Portmann
<span title="2020-11-18">2020</span> <i > arXiv </i> &nbsp; <span class="release-stage" >pre-print</span>
Machine Learning (ML)-based Network Intrusion Detection Systems (NIDSs) have proven to become a reliable intelligence tool to protect networks against cyberattacks.  ...  Therefore, a common ground feature set from multiple datasets is required to evaluate an ML model's detection accuracy and its ability to generalise across datasets.  ...  Similar to the NetFlow, IPFIX considers a flow to be any number of packets observed in a specific time slot and sharing some properties such as the five-tuple.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/2011.09144v1">arXiv:2011.09144v1</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/d6333bygrrgmvar2gb5y364s6e">fatcat:d6333bygrrgmvar2gb5y364s6e</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20201120045826/https://arxiv.org/pdf/2011.09144v1.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/9c/4f/9c4f0d030ea394bfd5be248b7bafbcad92e83080.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/2011.09144v1" title="arxiv.org access"> <button class="ui compact blue labeled icon button serp-button"> <i class="file alternate outline icon"></i> arxiv.org </button> </a>

Revealing Botnets Using Network Traffic Statistics

Pavel Čeleda, Muni Cz, Czech Republic, Radek Krejčí, Vojtěch Krmíček
<span class="release-stage">unpublished</span>
We propose an approach using network traffic statistics to reveal Unix-like embedded malware and its activities.  ...  We describe botnets using network connected embedded devices for illicit activities. There does not exist suitable security solution (anti-virus or anti-malware) for these devices.  ...  Mechanisms like a NetFlow/IPFIX generation are used to keep the communication traces.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/nvyo54iymfha7btngtkpjkfkvi">fatcat:nvyo54iymfha7btngtkpjkfkvi</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20180421063117/http://spi.unob.cz/papers/2011/2011-02.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/48/7f/487f1452b520bf5f8a77dd204e26be9cc6dc667c.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a>

Flow Monitoring Explained: From Packet Capture to Data Analysis With NetFlow and IPFIX

Rick Hofstede, Pavel Celeda, Brian Trammell, Idilio Drago, Ramin Sadre, Anna Sperotto, Aiko Pras
<span title="">2014</span> <i title="Institute of Electrical and Electronics Engineers (IEEE)"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/b4kxurpz5vbn7gog6wq32vliii" style="color: black;">IEEE Communications Surveys and Tutorials</a> </i> &nbsp;
Flow monitoring embraces the complete chain of packet observation, flow export using protocols such as NetFlow and IPFIX, data collection, and data analysis.  ...  Despite the fact that SSH traffic is encrypted, SSH dictionary attacks can be easily detected using flow analysis because of a typical attack pattern: Many credentials are tested subsequently and SSH daemons  ...  Threat Detection When flow data is used for threat detection, we can distinguish between roughly two types of uses.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/comst.2014.2321898">doi:10.1109/comst.2014.2321898</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/eefcoigarrfwhkikqiib2svvga">fatcat:eefcoigarrfwhkikqiib2svvga</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20160527213123/http://eprints.eemcs.utwente.nl:80/25179/01/tutorial.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/8a/f0/8af09f463e05a66ad4880911e0d16498434c0121.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/comst.2014.2321898"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> ieee.com </button> </a>

A Deep Learning-based Approach to Identifying and Mitigating Network Attacks Within SDN Environments Using Non-standard Data Sources

M Banton
<span title="">2021</span>
For many years, security administrators have used techniques such as deep packet inspection and signature analysis to detect malicious activity.  ...  AI and deep learning have advantages in being able to cope with 0-day attacks and being able to detect malicious activity despite the use of encryption and obfuscation techniques.  ...  This dataset was originally designed to test a method of SSH compromise detection using the NetFlow/IPFIX SDN flows.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.24377/ljmu.t.00014872">doi:10.24377/ljmu.t.00014872</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/kkauvwldbjemlpfz3wz7nsm2oa">fatcat:kkauvwldbjemlpfz3wz7nsm2oa</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20210501181148/http://researchonline.ljmu.ac.uk/id/eprint/14872/1/2021BantonPhD.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/05/9d/059dcd54b0306275e2d008d1dc3cf0ab8cda7751.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.24377/ljmu.t.00014872"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> Publisher / doi.org </button> </a>

SPHINX User Behaviour Simulator v1

Sotiris Pelekis
<span title="2020-10-30">2020</span> <i title="Zenodo"> Zenodo </i> &nbsp;
This can be realized using protocols like NetFlow, IPFIX, sampled NetFlow, sFlow etc.  ...  SPHINX addresses use-cases involving remote patient monitoring, aiming to prevent and detect suspicious and illicit activity.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.5281/zenodo.4280618">doi:10.5281/zenodo.4280618</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/fu4i7hry3zf75mrb2d5vhrq4bi">fatcat:fu4i7hry3zf75mrb2d5vhrq4bi</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20201121070230/https://zenodo.org/record/4280619/files/SPHINX%20D5.4%20-%20User%20Behaviour%20Simulation%20v1_v1.00.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/e7/c1/e7c189694278f76a3895302936bf4ea82f90bfd4.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.5281/zenodo.4280618"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> zenodo.org </button> </a>

Results and Achievements of the ALLIANCE Project: New Network Solutions for 5G and Beyond

Davide Careglio, Salvatore Spadaro, Albert Cabellos, Jose Antonio Lazaro, Pere Barlet-Ros, Joan Manel Gené, Jordi Perelló, Fernando Agraz Bujan, José Suárez-Varela, Albert Pàges, Jordi Paillissé, Paul Almasan (+2 others)
<span title="2021-09-30">2021</span> <i title="MDPI AG"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/smrngspzhzce7dy6ofycrfxbim" style="color: black;">Applied Sciences</a> </i> &nbsp;
As a result, we propose a practical solution that generates flow-level traffic measurement reports in SDN environments, similar to those of NetFlow/IPFIX [34] in traditional networks.  ...  This can be especially useful to detect potential cryptojacking attacks, which are becoming more and more common presently.  ...  Abbreviations The following abbreviations are used in this manuscript: AI  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.3390/app11199130">doi:10.3390/app11199130</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/pvmirvexuvginfztjqiwshx3le">fatcat:pvmirvexuvginfztjqiwshx3le</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20211005113434/https://mdpi-res.com/d_attachment/applsci/applsci-11-09130/article_deploy/applsci-11-09130.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/d5/c0/d5c090a360e0999e3286a3a31a5642b624698374.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.3390/app11199130"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> mdpi.com </button> </a>

Automated Monitoring and Security Services in Federated Software-defined Network Infrastructures [article]

Adam Pavlidis, National Technological University Of Athens
<span title="2020-07-14">2020</span>
These measurements are used to create centralized and localized monitoring views that enhance visibility into anomalous events.  ...  In addition to anomaly detection, this dissertation also explores solutions for attack mitigation.  ...  Indicatively we mention nProbe [68] a solution that may operate as probe (i.e. generator), collector and proxy for NetFlow/IPFIX traffic, typically assisted by PF_RING_ZC kernel bypass module.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.26240/heal.ntua.18573">doi:10.26240/heal.ntua.18573</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/cdkvlvomqjf2rgb5gein4snioq">fatcat:cdkvlvomqjf2rgb5gein4snioq</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20200717025920/https://dspace.lib.ntua.gr/xmlui/bitstream/handle/123456789/50875/20200630_dissertation_APAVLIDIS.pdf;jsessionid=E87D534FF60AEBBC61082648BD1DC66F?sequence=1" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/dd/c0/ddc00156ac258515243a18989f4a7ab7a963c520.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.26240/heal.ntua.18573"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> Publisher / doi.org </button> </a>
&laquo; Previous Showing results 1 &mdash; 15 out of 17 results