A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2004; you can also visit the original URL.
The file type is application/pdf
.
Filters
Survey and taxonomy of packet classification techniques
2005
ACM Computing Surveys
Using a taxonomy based on the high-level approach to the problem and a minimal set of running examples, we provide a survey of the seminal and recent solutions to the problem. ...
It is our hope to foster a deeper understanding of the various packet classification techniques while providing a useful framework for discerning relationships and distinctions. ...
I would also like to thank Ed Spitznagel for contributing his insight to countless discussions on packet classification techniques. ...
doi:10.1145/1108956.1108958
fatcat:ddlukdl3z5fddbqlvrc7s32cq4
A survey of methods for encrypted traffic classification and analysis
2015
International Journal of Network Management
Then, we survey payload and feature-based classification methods for encrypted traffic and categorize them using an established taxonomy. ...
In specific cases, even the content of the encrypted connection can be established. To describe and categorize the classification methods, we use the taxonomy of Khalife et al. [48] . ...
This taxonomy is uniquely descriptive and allows us to efficiently categorize all our surveyed classification methods. Figure 6 shows an overview of the taxonomy levels. ...
doi:10.1002/nem.1901
fatcat:k4ntvq6lyraq5elxrt2xzxz324
Taxonomy and survey of retransmission-based partially reliable transport protocols
2004
Computer Communications
The survey shows how protocols are categorized according to our taxonomy, and exemplifies the majority of reliability services and error control schemes detailed in our taxonomy. ...
Based on our taxonomy, a survey was made of existing retransmission based, partially reliable transport protocols. ...
A selection of existing protocols was also surveyed and classified according to the taxonomy. The proposed taxonomy comprises two classification schemes. ...
doi:10.1016/j.comcom.2004.04.005
fatcat:h3nmiymmxzaengmp3xnq3yuvlm
Inside packet sampling techniques: exploring modularity to enhance network measurements
2016
International Journal of Communication Systems
Traveling inside packet sampling techniques, this paper contributes to a clearer positioning and comparison of existing proposals, providing a road map to assist further research and deployments in the ...
In this context, this paper defines a taxonomy of traffic sampling techniques based on a comprehensive analysis of the inner components of existing proposals. ...
ACKNOWLEDGEMENTS This work has been supported by FCT -Fundação para a Ciência e Tecnologia in the scope of the project: UID/CEC/00319/2013. ...
doi:10.1002/dac.3135
fatcat:j6h6obtvenh3bnhyiv3vwoukdu
How to Enable Delay Tolerant Network Solutions for Internet of Things: From Taxonomy to Open Challenges
2019
Proceedings (MDPI)
Furthermore, we survey a number of DTN solutions for IoT and propose a new taxonomy to motivate the importance of enabling DTN for IoT applications. ...
In this paper, we present a literature review and a classification of DTN routing protocols. ...
[13] introduced a taxonomy of routing in DTNs into Unicasting, Multicasting and Anycasting issues, which addresses the number of copies of the packets sent from a destination and whether a packet is ...
doi:10.3390/proceedings2019031024
fatcat:swddce22a5fg7ooug5ezaw2mba
Intrusion detection systems: A survey and taxonomy
[article]
2022
Zenodo
This paper will survey and propose the taxonomy to show modern IDS and their threats. ...
using intrusion detection systems (IDS) to identify different types of malicious traffic. ...
This paper will be focusing on surveying and classifying IDS techniques and then evaluating them. ...
doi:10.5281/zenodo.6629058
fatcat:amqap2oujnewtngi7as5dbkcky
Detection of HTTP Flooding DDoS Attack using Hadoop with MapReduce: A Survey
2019
International Journal of Advanced Trends in Computer Science and Engineering
This survey paper emphasizes on DDoS attack mainly HTTP GET flooding attack and a detection technique that is based on MapReduce. ...
These attacks flood the target network with a large number of packets because of which network becomes incapable of providing the services to its legitimate users. ...
DISCUSSION AND COMPARISON OF THIS SURVEY WITH EXISTING SURVEY The analysis of scientific relevant literature and synthesizes parameters on packet and traffic flow levels applicable to the detection of ...
doi:10.30534/ijatcse/2019/12812019
fatcat:kb7e4rqrunbajmc3ybb46qdrce
A Taxonomy and Survey of Intrusion Detection System Design Techniques, Network Threats and Datasets
[article]
2018
arXiv
pre-print
This manuscript aims to provide researchers with a taxonomy and survey of current dataset composition and current Intrusion Detection Systems (IDS) capabilities and assets. ...
To this end, this manuscript also provides a taxonomy and survey or network threats and associated tools. ...
A Taxonomy and Survey of Intrusion Detection System Design Techniques, Network Threats and Datasets :9 A Taxonomy and Survey of Intrusion Detection System Design Techniques, Network Threats ...
arXiv:1806.03517v1
fatcat:d6vf2i7gkzbjvm6zb7s6hqcn2e
A Survey on Tor Encrypted Traffic Monitoring
2018
International Journal of Advanced Computer Science and Applications
Therefore, numerous of research has been performed on encrypted traffic analyzing and classification using machine learning techniques. ...
Next, there are comparison of the surveyed traffic classification and discussion on their classification properties. 114 | P a g e www.ijacsa.thesai.org encryption to uncover the next destination of the ...
Most surveyed studies use flow and packet features as the input for the traffic classification technique. ...
doi:10.14569/ijacsa.2018.090815
fatcat:wmjcrz4jojhzxmjv3a52sf4toe
A Security Threats Taxonomy for Routing System Intrusion Detection
2016
2016 12th International Conference on Computational Intelligence and Security (CIS)
This manuscript aims to provide researchers with a taxonomy and survey of current dataset composition and current Intrusion Detection Systems (IDS) capabilities and assets. ...
To this end, this manuscript also provides a taxonomy and survey or network threats and associated tools. ...
A Taxonomy and Survey of Intrusion Detection System Design Techniques, Network Threats and Datasets :9 A Taxonomy and Survey of Intrusion Detection System Design Techniques, Network Threats ...
doi:10.1109/cis.2016.0068
dblp:conf/cis/MiaoWGZ16
fatcat:qp7rz34u3fbhhlvfxl5nakdewe
Computer Security: a Survey of Methods and Systems
2007
Journal of Computer Science
In this work we have reviewed studies which survey all aspects of computer security including attackers and attacks, software bugs and viruses as well as different intrusion detection systems and ways ...
The aim was to develop a survey of security related issues which would provide adequate information and advice to newcomers to the field as well as a good reference guide for security professionals. ...
Author uses developed classification to survey and classify a number of research prototypes. ...
doi:10.3844/jcssp.2007.478.486
fatcat:danu7zkp7rhsbd5qva75ksv7n4
Machine Learning and Deep Learning Methods for Intrusion Detection Systems: A Survey
2019
Applied Sciences
We believe that this type of taxonomy framework is fit for cyber security researchers. The survey first clarifies the concept and taxonomy of IDSs. ...
This survey proposes a taxonomy of IDS that takes data objects as the main dimension to classify and summarize machine learning-based and deep learning-based IDS literature. ...
This survey combines these two types of IDS classification methods, taking the data source as the main classification consideration and treating the detection method as a secondary classification element ...
doi:10.3390/app9204396
fatcat:g2mb3g7atbhhtjx3yafczkgumi
Pattern-Based Survey and Categorization of Network Covert Channel Techniques
2015
ACM Computing Surveys
We surveyed and analyzed 109 techniques developed between 1987 and 2013 and show that these techniques can be reduced to only 11 different patterns. ...
Moreover, the majority (69.7%) of techniques can be categorized in only four different patterns, i.e. most of the techniques we surveyed are very similar. ...
ACKNOWLEDGEMENTS We thank Jörg Keller as well as Michael Meier and the reading group at Fraunhofer FKIE for suggesting many improvements to previous versions of this paper. ...
doi:10.1145/2684195
fatcat:d5tpu4zp3zgdjd5qb6e7u5ps5a
Survey of intrusion detection systems: techniques, datasets and challenges
2019
Cybersecurity
Availability of data and materials This manuscript has not been published and is not under consideration for publication elsewhere. ...
The authors are grateful to the Centre for Informatics and Applied Optimization (CIAO) for their support. ...
., 2000) surveyed detection methods based on the behaviour and knowledge profiles of the attacks. A taxonomy of intrusion systems by Liao et al. ...
doi:10.1186/s42400-019-0038-7
fatcat:x7gyb3vqhfcldehzmo5dnuvclq
A Pattern-based Survey and Categorization of Network Covert Channel Techniques
[article]
2015
arXiv
pre-print
We surveyed and analyzed 109 techniques developed between 1987 and 2013 and show that these techniques can be reduced to only 11 different patterns. ...
Moreover, the majority (69.7%) of techniques can be categorized in only four different patterns, i.e. most of the techniques we surveyed are very similar. ...
ACKNOWLEDGEMENTS We thank Jörg Keller as well as Michael Meier and the reading group at Fraunhofer FKIE for suggesting many improvements to previous versions of this paper. ...
arXiv:1406.2901v2
fatcat:cegov56rwjhdxf4u5yfgsz2jkm
« Previous
Showing results 1 — 15 out of 4,011 results