A Software Deep Packet Inspection System for Network Traffic Analysis and Anomaly Detection
暂无分享,去创建一个
Orest Kochan | Jun Su | Daniel Pieniak | Mykola Beshley | Krzysztof Przystupa | Wenguang Song | Halyna Beshley | Andrii Pryslupskyi | O. Kochan | D. Pieniak | Wenguang Song | Krzysztof Przystupa | M. Beshley | H. Beshley | J. Su | A. Pryslupskyi
[1] Keecheon Kim,et al. A Study on SDN security enhancement using open source IDS/IPS Suricata , 2018, 2018 International Conference on Information and Communication Technology Convergence (ICTC).
[2] Guohong Ma,et al. Sequential similarity detection algorithm based on image edge feature , 2014 .
[3] Jinoh Kim,et al. Unsupervised Labeling for Supervised Anomaly Detection in Enterprise and Cloud Networks , 2017, 2017 IEEE 4th International Conference on Cyber Security and Cloud Computing (CSCloud).
[4] Vasyl Romanchuk,et al. Method for processing multiservice traffic in network node based on adaptive management of buffer resource , 2018, 2018 14th International Conference on Advanced Trends in Radioelecrtronics, Telecommunications and Computer Engineering (TCSET).
[5] Ivan Demydov,et al. Mobility management and vertical handover decision in an always best connected heterogeneous network , 2015, The Experience of Designing and Application of CAD Systems in Microelectronics.
[6] Paweł Dymora,et al. Anomaly Detection in IoT Communication Network Based on Spectral Analysis and Hurst Exponent , 2019, Applied Sciences.
[7] Joanna Michałowska,et al. Prediction of the parameters of magnetic field of CNC machine tools , 2019, PRZEGLĄD ELEKTROTECHNICZNY.
[8] Krzysztof Przystupa. The methods analysis of hazards and product defects in food processing , 2019 .
[9] Younghun Chae,et al. Representing Stastical Network-Based Anomaly Detection by Using Trust , 2017 .
[10] Gerhard P. Hancke,et al. A Survey of Anomaly Detection in Industrial Wireless Sensor Networks with Critical Water System Infrastructure as a Case Study , 2018, Sensors.
[11] Hahn-Ming Lee,et al. Detection of DNS Tunneling by Feature-Free Mechanism , 2018, 2018 IEEE Conference on Dependable and Secure Computing (DSC).
[12] Chittaranjan Hota,et al. Heuristic-Based Real-Time P2P Traffic Identification , 2015, 2015 International Conference on Emerging Information Technology and Engineering Solutions.
[13] José Ignacio Suárez,et al. Wireless Sensor Network Combined with Cloud Computing for Air Quality Monitoring , 2019, Sensors.
[14] Vasyl Romanchuk,et al. Design of software router with a modular structure and automatic deployment at virtual nodes , 2017, 2017 2nd International Conference on Advanced Information and Communication Technologies (AICT).
[15] Taras Maksymyuk,et al. Method of centralized resource allocation in virtualized small cells network with IoT overlay , 2018, 2018 14th International Conference on Advanced Trends in Radioelecrtronics, Telecommunications and Computer Engineering (TCSET).
[16] Hyunsoo Kwon,et al. A survey on MITM and its countermeasures in the TLS handshake protocol , 2016, 2016 Eighth International Conference on Ubiquitous and Future Networks (ICUFN).
[17] Mykhailo Klymash,et al. Algorithm for clusterization, aggregation and prioritization of M2M devices in heterogeneous 4G/5G network , 2017, 2017 4th International Scientific-Practical Conference Problems of Infocommunications. Science and Technology (PIC S&T).
[18] Orest Kochan,et al. Theoretical and Experimental Research of Error of Method of Thermocouple with Controlled Profile of Temperature Field , 2015 .
[19] Antonio Pescapè,et al. Speeding-Up DPI Traffic Classification with Chaining , 2018, 2018 IEEE Global Communications Conference (GLOBECOM).
[20] Yang Xu,et al. CSI-based low-duty-cycle wireless multimedia sensor network for security monitoring , 2018 .
[21] Orest Kochan,et al. Common mode noise rejection in measuring channels , 2015 .
[22] Yousaf Bin Zikria,et al. Internet of Things (IoT) Operating Systems Management: Opportunities, Challenges, and Solution , 2019, Sensors.
[23] Mykola Beshley,et al. Adaptive flow routing model in SDN , 2017, 2017 14th International Conference The Experience of Designing and Application of CAD Systems in Microelectronics (CADSM).
[24] Jean-Charles Grégoire,et al. Network intrusion detection through artificial immune system , 2017, 2017 Annual IEEE International Systems Conference (SysCon).
[25] Mykhailo Klymash,et al. Development of monitoring system for end-to-end packet delay measurement in software-defined networks , 2016, 2016 13th International Conference on Modern Problems of Radio Engineering, Telecommunications and Computer Science (TCSET).
[26] Wahyu Caesarendra,et al. Detection of Deterioration of Three-phase Induction Motor using Vibration Signals , 2019 .
[27] Timo Hämäläinen,et al. Network Anomaly Detection in Wireless Sensor Networks: A Review , 2019, NEW2AN.
[28] Iqbal Gondal,et al. Survey of intrusion detection systems: techniques, datasets and challenges , 2019, Cybersecurity.
[29] Tingting Li,et al. Multi-level Anomaly Detection in Industrial Control Systems via Package Signatures and LSTM Networks , 2017, 2017 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN).
[30] R. M. Hushangabade,et al. Internet of Things (IOT): An overview and its applications , 2017, 2017 International Conference on Energy, Communication, Data Analytics and Soft Computing (ICECDS).
[31] Dhruba Kumar Bhattacharyya,et al. Self-similarity based DDoS attack detection using Hurst parameter , 2016, Secur. Commun. Networks.
[32] Marc-Oliver Pahl,et al. All Eyes on You: Distributed Multi-Dimensional IoT Microservice Anomaly Detection , 2018, 2018 14th International Conference on Network and Service Management (CNSM).
[33] Tolga Ergen,et al. A novel anomaly detection approach based on neural networks , 2018, 2018 26th Signal Processing and Communications Applications Conference (SIU).
[34] V. Koval,et al. The model of prioritization of services for efficient usage of multiservice network resources , 2012, Proceedings of International Conference on Modern Problem of Radio Engineering, Telecommunications and Computer Science.
[35] Daniel Pieniak,et al. The Effect of Thermocycling on Surface Layer Properties of Light Cured Polymer Matrix Ceramic Composites (PMCCs) Used in Sliding Friction Pair , 2019, Materials.
[36] Namita Mittal,et al. Hybrid Approach for Detection of Anomaly Network Traffic using Data Mining Techniques , 2012 .
[37] Giancarlo Fortino,et al. Short-long term anomaly detection in wireless sensor networks based on machine learning and multi-parameterized edit distance , 2019, Inf. Fusion.
[38] Jeong Geun Kim,et al. A Survey of Energy-Efficient Communication Protocols with QoS Guarantees in Wireless Multimedia Sensor Networks , 2019, Sensors.
[39] Andreas Herkersdorf,et al. Deep packet inspection in residential gateways and routers: Issues and challenges , 2014, 2014 International Symposium on Integrated Circuits (ISIC).
[40] Mykhailo Klymash,et al. A Cost-Efficient Software Based Router and Traffic Generator for Simulation and Testing of IP Network , 2019, Electronics.
[41] Mykhailo Klymash,et al. Method for optimal use of 4G/5G heterogeneous network resourses under M2M/IoT traffic growth conditions , 2017, 2017 International Conference on Information and Telecommunication Technologies and Radio Electronics (UkrMiCo).
[42] Roman Kochan,et al. Thermocouples with Built-In Self-testing , 2016 .
[43] Ayman M. Bahaa-Eldin,et al. A survey on deep packet inspection , 2017, 2017 12th International Conference on Computer Engineering and Systems (ICCES).
[44] Igor S. Barsukov,et al. Fractal Analysis based Detection of DoS/LDoS Network Attacks , 2019, 2019 International Russian Automation Conference (RusAutoCon).
[45] Volodymyr Chervenets,et al. Ensuring the quality of service flows in multiservice infrastructure based on network node virtualization , 2016, 2016 International Conference Radio Electronics & Info Communications (UkrMiCo).
[46] Daniel Pieniak,et al. Hydro-Thermal Fatigue of Polymer Matrix Composite Biomaterials , 2019, Materials.
[47] Evgeniya Nikolova,et al. Applications of Clustering Methods to Anomaly-Based Intrusion Detection Systems , 2015, 2015 8th International Conference on Database Theory and Application (DTA).
[48] Xiaomin Fang,et al. Real time expert system for anomaly detection of aerators based on computer vision technology and existing surveillance cameras , 2018, ArXiv.
[49] Bhavani M. Thuraisingham,et al. Statistical technique for online anomaly detection using Spark over heterogeneous data from multi-source VMware performance data , 2014, 2014 IEEE International Conference on Big Data (Big Data).
[50] Helena Rifà-Pous,et al. A Comparative Study of Anomaly Detection Techniques for Smart City Wireless Sensor Networks , 2016, Sensors.
[51] Thaksen J. Parvat,et al. Performance improvement of deep packet inspection for Intrusion Detection , 2014, 2014 IEEE Global Conference on Wireless Computing & Networking (GCWCN).
[52] Javier Carmona-Murillo,et al. Detection and Mitigation of DoS and DDoS Attacks in IoT-Based Stateful SDN: An Experimental Approach , 2020, Sensors.
[53] A. Taufiq Asyhari,et al. The Emergence of Internet of Things (IoT): Connecting Anything, Anywhere , 2019, Comput..
[54] Chen-Ching Liu,et al. Anomaly Detection for Cybersecurity of the Substations , 2011, IEEE Transactions on Smart Grid.
[55] Karuna Pande Joshi,et al. Anomaly Detection Models for Smart Home Security , 2019, 2019 IEEE 5th Intl Conference on Big Data Security on Cloud (BigDataSecurity), IEEE Intl Conference on High Performance and Smart Computing, (HPSC) and IEEE Intl Conference on Intelligent Data and Security (IDS).
[56] Mykola Beshley,et al. Automated Recovery of Server Applications for SDN-Based Internet of Things , 2019, 2019 3rd International Conference on Advanced Information and Communications Technologies (AICT).
[57] Giuseppe Aceto,et al. Mobile Encrypted Traffic Classification Using Deep Learning: Experimental Evaluation, Lessons Learned, and Challenges , 2019, IEEE Transactions on Network and Service Management.
[58] Leonardo Badia,et al. Evaluation of Deficit Round Robin Queue Discipline for Real-time Traffic Management in an RTP/RTCP Environment , 2010, 2010 Fourth UKSim European Symposium on Computer Modeling and Simulation.
[59] Félix J. García Clemente,et al. A Self-Adaptive Deep Learning-Based System for Anomaly Detection in 5G Networks , 2018, IEEE Access.
[60] M. M. A. Hashem,et al. Attack and anomaly detection in IoT sensors in IoT sites using machine learning approaches , 2019, Internet Things.
[61] Dario Rossi,et al. On the impact of uTP on BitTorrent completion time , 2011, 2011 IEEE International Conference on Peer-to-Peer Computing.
[62] Maurizio Martinelli,et al. nDPI: Open-source high-speed deep packet inspection , 2014, 2014 International Wireless Communications and Mobile Computing Conference (IWCMC).
[63] Bo Sun,et al. Analyzing and summarizing the web server detection technology based on HTTP , 2015, 2015 6th IEEE International Conference on Software Engineering and Service Science (ICSESS).
[64] Seiichi Uchida,et al. A Comparative Evaluation of Unsupervised Anomaly Detection Algorithms for Multivariate Data , 2016, PloS one.
[65] Samer Jaloudi,et al. Communication Protocols of an Industrial Internet of Things Environment: A Comparative Study , 2019, Future Internet.
[66] Pinyi Ren,et al. Semi-supervised learning based big data-driven anomaly detection in mobile wireless networks , 2018, China Communications.
[67] Lucas C. Cordeiro,et al. Bounded model checking of C++ programs based on the Qt framework , 2015, 2015 IEEE 4th Global Conference on Consumer Electronics (GCCE).
[68] Kire Jakimoski,et al. Improvement of Hardware Firewall’s Data Rates by Optimizing Suricata Performances , 2019, 2019 27th Telecommunications Forum (TELFOR).
[69] M. Klymash,et al. The researching and modeling of structures of mobile networks for providing of multiservice radio access , 2012, Proceedings of International Conference on Modern Problem of Radio Engineering, Telecommunications and Computer Science.
[70] Grzegorz Krolczyk,et al. Study on metrological relations between instant tool displacements and surface roughness during precise ball end milling , 2018, Measurement.
[71] Shaoqiang Wang,et al. Analysis and application of Wireshark in TCP/IP protocol teaching , 2010, 2010 International Conference on E-Health Networking Digital Ecosystems and Technologies (EDT).
[72] Mykhailo Klymash,et al. Investigation and simulation of system for data flow processing in multiservice nodes using virtualization mechanisms , 2017, 2017 IEEE First Ukraine Conference on Electrical and Computer Engineering (UKRCON).
[73] Orest Kochan,et al. Information-measuring System to Study the Thermocouple with Controlled Temperature Field , 2019, Measurement Science Review.
[74] An Xiaoguang,et al. Packet Capture and Protocol Analysis Based on Winpcap , 2016, 2016 International Conference on Robots & Intelligent System (ICRIS).