Filters








4,011 Hits in 3.3 sec

Survey and taxonomy of packet classification techniques

David E. Taylor
2005 ACM Computing Surveys  
Using a taxonomy based on the high-level approach to the problem and a minimal set of running examples, we provide a survey of the seminal and recent solutions to the problem.  ...  It is our hope to foster a deeper understanding of the various packet classification techniques while providing a useful framework for discerning relationships and distinctions.  ...  I would also like to thank Ed Spitznagel for contributing his insight to countless discussions on packet classification techniques.  ... 
doi:10.1145/1108956.1108958 fatcat:ddlukdl3z5fddbqlvrc7s32cq4

A survey of methods for encrypted traffic classification and analysis

Petr Velan, Milan Čermák, Pavel Čeleda, Martin Drašar
2015 International Journal of Network Management  
Then, we survey payload and feature-based classification methods for encrypted traffic and categorize them using an established taxonomy.  ...  In specific cases, even the content of the encrypted connection can be established. To describe and categorize the classification methods, we use the taxonomy of Khalife et al. [48] .  ...  This taxonomy is uniquely descriptive and allows us to efficiently categorize all our surveyed classification methods. Figure 6 shows an overview of the taxonomy levels.  ... 
doi:10.1002/nem.1901 fatcat:k4ntvq6lyraq5elxrt2xzxz324

Taxonomy and survey of retransmission-based partially reliable transport protocols

Karl-Johan Grinnemo, Johan Garcia, Anna Brunstrom
2004 Computer Communications  
The survey shows how protocols are categorized according to our taxonomy, and exemplifies the majority of reliability services and error control schemes detailed in our taxonomy.  ...  Based on our taxonomy, a survey was made of existing retransmission based, partially reliable transport protocols.  ...  A selection of existing protocols was also surveyed and classified according to the taxonomy. The proposed taxonomy comprises two classification schemes.  ... 
doi:10.1016/j.comcom.2004.04.005 fatcat:h3nmiymmxzaengmp3xnq3yuvlm

Inside packet sampling techniques: exploring modularity to enhance network measurements

João Marco C. Silva, Paulo Carvalho, Solange Rito Lima
2016 International Journal of Communication Systems  
Traveling inside packet sampling techniques, this paper contributes to a clearer positioning and comparison of existing proposals, providing a road map to assist further research and deployments in the  ...  In this context, this paper defines a taxonomy of traffic sampling techniques based on a comprehensive analysis of the inner components of existing proposals.  ...  ACKNOWLEDGEMENTS This work has been supported by FCT -Fundação para a Ciência e Tecnologia in the scope of the project: UID/CEC/00319/2013.  ... 
doi:10.1002/dac.3135 fatcat:j6h6obtvenh3bnhyiv3vwoukdu

How to Enable Delay Tolerant Network Solutions for Internet of Things: From Taxonomy to Open Challenges

Selma Bounsiar, Fatima Zohra Benhamida, Abderrazak Henni, Diego López de Ipiña, Diego Casado Mansilla
2019 Proceedings (MDPI)  
Furthermore, we survey a number of DTN solutions for IoT and propose a new taxonomy to motivate the importance of enabling DTN for IoT applications.  ...  In this paper, we present a literature review and a classification of DTN routing protocols.  ...  [13] introduced a taxonomy of routing in DTNs into Unicasting, Multicasting and Anycasting issues, which addresses the number of copies of the packets sent from a destination and whether a packet is  ... 
doi:10.3390/proceedings2019031024 fatcat:swddce22a5fg7ooug5ezaw2mba

Intrusion detection systems: A survey and taxonomy [article]

Mohammed Tahmid Ahmed
2022 Zenodo  
This paper will survey and propose the taxonomy to show modern IDS and their threats.  ...  using intrusion detection systems (IDS) to identify different types of malicious traffic.  ...  This paper will be focusing on surveying and classifying IDS techniques and then evaluating them.  ... 
doi:10.5281/zenodo.6629058 fatcat:amqap2oujnewtngi7as5dbkcky

Detection of HTTP Flooding DDoS Attack using Hadoop with MapReduce: A Survey

Ziyad R. Al Ashhab
2019 International Journal of Advanced Trends in Computer Science and Engineering  
This survey paper emphasizes on DDoS attack mainly HTTP GET flooding attack and a detection technique that is based on MapReduce.  ...  These attacks flood the target network with a large number of packets because of which network becomes incapable of providing the services to its legitimate users.  ...  DISCUSSION AND COMPARISON OF THIS SURVEY WITH EXISTING SURVEY The analysis of scientific relevant literature and synthesizes parameters on packet and traffic flow levels applicable to the detection of  ... 
doi:10.30534/ijatcse/2019/12812019 fatcat:kb7e4rqrunbajmc3ybb46qdrce

A Taxonomy and Survey of Intrusion Detection System Design Techniques, Network Threats and Datasets [article]

Hanan Hindy and David Brosset and Ethan Bayne and Amar Seeam and Christos Tachtatzis and Robert Atkinson and Xavier Bellekens
2018 arXiv   pre-print
This manuscript aims to provide researchers with a taxonomy and survey of current dataset composition and current Intrusion Detection Systems (IDS) capabilities and assets.  ...  To this end, this manuscript also provides a taxonomy and survey or network threats and associated tools.  ...  A Taxonomy and Survey of Intrusion Detection System Design Techniques, Network Threats and Datasets :9 A Taxonomy and Survey of Intrusion Detection System Design Techniques, Network Threats  ... 
arXiv:1806.03517v1 fatcat:d6vf2i7gkzbjvm6zb7s6hqcn2e

A Survey on Tor Encrypted Traffic Monitoring

Mohamad Amar Irsyad Mohd Aminuddin, Zarul Fitri, Manmeet Kaur, Darshan Singh
2018 International Journal of Advanced Computer Science and Applications  
Therefore, numerous of research has been performed on encrypted traffic analyzing and classification using machine learning techniques.  ...  Next, there are comparison of the surveyed traffic classification and discussion on their classification properties. 114 | P a g e www.ijacsa.thesai.org encryption to uncover the next destination of the  ...  Most surveyed studies use flow and packet features as the input for the traffic classification technique.  ... 
doi:10.14569/ijacsa.2018.090815 fatcat:wmjcrz4jojhzxmjv3a52sf4toe

A Security Threats Taxonomy for Routing System Intrusion Detection

Fu Miao, Zhenxing Wang, Yi Guo, Liancheng Zhang
2016 2016 12th International Conference on Computational Intelligence and Security (CIS)  
This manuscript aims to provide researchers with a taxonomy and survey of current dataset composition and current Intrusion Detection Systems (IDS) capabilities and assets.  ...  To this end, this manuscript also provides a taxonomy and survey or network threats and associated tools.  ...  A Taxonomy and Survey of Intrusion Detection System Design Techniques, Network Threats and Datasets :9 A Taxonomy and Survey of Intrusion Detection System Design Techniques, Network Threats  ... 
doi:10.1109/cis.2016.0068 dblp:conf/cis/MiaoWGZ16 fatcat:qp7rz34u3fbhhlvfxl5nakdewe

Computer Security: a Survey of Methods and Systems

Roman V. Yampolskiy, Venu Govindaraj
2007 Journal of Computer Science  
In this work we have reviewed studies which survey all aspects of computer security including attackers and attacks, software bugs and viruses as well as different intrusion detection systems and ways  ...  The aim was to develop a survey of security related issues which would provide adequate information and advice to newcomers to the field as well as a good reference guide for security professionals.  ...  Author uses developed classification to survey and classify a number of research prototypes.  ... 
doi:10.3844/jcssp.2007.478.486 fatcat:danu7zkp7rhsbd5qva75ksv7n4

Machine Learning and Deep Learning Methods for Intrusion Detection Systems: A Survey

Hongyu Liu, Bo Lang
2019 Applied Sciences  
We believe that this type of taxonomy framework is fit for cyber security researchers. The survey first clarifies the concept and taxonomy of IDSs.  ...  This survey proposes a taxonomy of IDS that takes data objects as the main dimension to classify and summarize machine learning-based and deep learning-based IDS literature.  ...  This survey combines these two types of IDS classification methods, taking the data source as the main classification consideration and treating the detection method as a secondary classification element  ... 
doi:10.3390/app9204396 fatcat:g2mb3g7atbhhtjx3yafczkgumi

Pattern-Based Survey and Categorization of Network Covert Channel Techniques

Steffen Wendzel, Sebastian Zander, Bernhard Fechner, Christian Herdin
2015 ACM Computing Surveys  
We surveyed and analyzed 109 techniques developed between 1987 and 2013 and show that these techniques can be reduced to only 11 different patterns.  ...  Moreover, the majority (69.7%) of techniques can be categorized in only four different patterns, i.e. most of the techniques we surveyed are very similar.  ...  ACKNOWLEDGEMENTS We thank Jörg Keller as well as Michael Meier and the reading group at Fraunhofer FKIE for suggesting many improvements to previous versions of this paper.  ... 
doi:10.1145/2684195 fatcat:d5tpu4zp3zgdjd5qb6e7u5ps5a

Survey of intrusion detection systems: techniques, datasets and challenges

Ansam Khraisat, Iqbal Gondal, Peter Vamplew, Joarder Kamruzzaman
2019 Cybersecurity  
Availability of data and materials This manuscript has not been published and is not under consideration for publication elsewhere.  ...  The authors are grateful to the Centre for Informatics and Applied Optimization (CIAO) for their support.  ...  ., 2000) surveyed detection methods based on the behaviour and knowledge profiles of the attacks. A taxonomy of intrusion systems by Liao et al.  ... 
doi:10.1186/s42400-019-0038-7 fatcat:x7gyb3vqhfcldehzmo5dnuvclq

A Pattern-based Survey and Categorization of Network Covert Channel Techniques [article]

Steffen Wendzel and Sebastian Zander and Bernhard Fechner and Christian Herdin
2015 arXiv   pre-print
We surveyed and analyzed 109 techniques developed between 1987 and 2013 and show that these techniques can be reduced to only 11 different patterns.  ...  Moreover, the majority (69.7%) of techniques can be categorized in only four different patterns, i.e. most of the techniques we surveyed are very similar.  ...  ACKNOWLEDGEMENTS We thank Jörg Keller as well as Michael Meier and the reading group at Fraunhofer FKIE for suggesting many improvements to previous versions of this paper.  ... 
arXiv:1406.2901v2 fatcat:cegov56rwjhdxf4u5yfgsz2jkm
« Previous Showing results 1 — 15 out of 4,011 results