Attributes | Values |
---|
rdf:type
| |
Description
| - Our paper describes security awareness framework targeted for high-speed networks. It addresses the issues in detailed network observation and how to get information about who communicates with whom, when, how long, how often, using what protocol and service and also how much data was transferred. To preserve users' privacy while identifying anomalous behaviors we use the NetFlow statistics. Specialized standard and hardware-accelerated flow monitoring probes are used to generate unsampled flow data from observed networks. We use several anomaly detection algorithms based on network behavioral analysis to classify legitimate and malicious traffic.
- Our paper describes security awareness framework targeted for high-speed networks. It addresses the issues in detailed network observation and how to get information about who communicates with whom, when, how long, how often, using what protocol and service and also how much data was transferred. To preserve users' privacy while identifying anomalous behaviors we use the NetFlow statistics. Specialized standard and hardware-accelerated flow monitoring probes are used to generate unsampled flow data from observed networks. We use several anomaly detection algorithms based on network behavioral analysis to classify legitimate and malicious traffic. (en)
|
Title
| - Flow Based Security Awareness Framework for High-Speed Networks
- Flow Based Security Awareness Framework for High-Speed Networks (en)
|
skos:prefLabel
| - Flow Based Security Awareness Framework for High-Speed Networks
- Flow Based Security Awareness Framework for High-Speed Networks (en)
|
skos:notation
| - RIV/68407700:21230/09:00158350!RIV10-MSM-21230___
|
http://linked.open...avai/riv/aktivita
| |
http://linked.open...avai/riv/aktivity
| |
http://linked.open...vai/riv/dodaniDat
| |
http://linked.open...aciTvurceVysledku
| |
http://linked.open.../riv/druhVysledku
| |
http://linked.open...iv/duvernostUdaju
| |
http://linked.open...titaPredkladatele
| |
http://linked.open...dnocenehoVysledku
| |
http://linked.open...ai/riv/idVysledku
| - RIV/68407700:21230/09:00158350
|
http://linked.open...riv/jazykVysledku
| |
http://linked.open.../riv/klicovaSlova
| - intrusion detection; network behavior analysis; anomaly detection; NetFlow; CAMNEP; FlowMon; Conficker (en)
|
http://linked.open.../riv/klicoveSlovo
| |
http://linked.open...ontrolniKodProRIV
| |
http://linked.open...v/mistoKonaniAkce
| |
http://linked.open...i/riv/mistoVydani
| |
http://linked.open...i/riv/nazevZdroje
| - Security and Protection of Information 2009: Proceesings of the Conference
|
http://linked.open...in/vavai/riv/obor
| |
http://linked.open...ichTvurcuVysledku
| |
http://linked.open...cetTvurcuVysledku
| |
http://linked.open...UplatneniVysledku
| |
http://linked.open...iv/tvurceVysledku
| - Bartoš, Karel
- Rehák, Martin
|
http://linked.open...vavai/riv/typAkce
| |
http://linked.open.../riv/zahajeniAkce
| |
http://linked.open...n/vavai/riv/zamer
| |
number of pages
| |
http://purl.org/ne...btex#hasPublisher
| |
https://schema.org/isbn
| |
http://localhost/t...ganizacniJednotka
| |
is http://linked.open...avai/riv/vysledek
of | |