Attributes | Values |
---|
rdf:type
| |
Description
| - Network behavior analysis techniques are designed to detect intrusions and other undesirable behavior in computer networks by analyzing the tra_c statistics. We present an e_cient framework for integration of anomaly detection algorithms working on the identical input data. This framework is based on high-speed network tra_c acquisition subsystem and on trust modeling, a well-established set of techniques from the multi-agent system _eld. Trust-based integration of algorithms results in classi_cation with lower error rate, especially in terms of false positives. The presented system is suitable for both online and o_ine processing, and introduces a relatively low computational overhead compared to deployment of isolated anomaly detection algorithms.
- Network behavior analysis techniques are designed to detect intrusions and other undesirable behavior in computer networks by analyzing the tra_c statistics. We present an e_cient framework for integration of anomaly detection algorithms working on the identical input data. This framework is based on high-speed network tra_c acquisition subsystem and on trust modeling, a well-established set of techniques from the multi-agent system _eld. Trust-based integration of algorithms results in classi_cation with lower error rate, especially in terms of false positives. The presented system is suitable for both online and o_ine processing, and introduces a relatively low computational overhead compared to deployment of isolated anomaly detection algorithms. (en)
|
Title
| - Collaborative Approach to Network Behavior Analysis Based on Hardware-Accelerated FlowMon Probes
- Collaborative Approach to Network Behavior Analysis Based on Hardware-Accelerated FlowMon Probes (en)
|
skos:prefLabel
| - Collaborative Approach to Network Behavior Analysis Based on Hardware-Accelerated FlowMon Probes
- Collaborative Approach to Network Behavior Analysis Based on Hardware-Accelerated FlowMon Probes (en)
|
skos:notation
| - RIV/68407700:21230/09:00164573!RIV10-MSM-21230___
|
http://linked.open...avai/riv/aktivita
| |
http://linked.open...avai/riv/aktivity
| |
http://linked.open...iv/cisloPeriodika
| |
http://linked.open...vai/riv/dodaniDat
| |
http://linked.open...aciTvurceVysledku
| |
http://linked.open.../riv/druhVysledku
| |
http://linked.open...iv/duvernostUdaju
| |
http://linked.open...titaPredkladatele
| |
http://linked.open...dnocenehoVysledku
| |
http://linked.open...ai/riv/idVysledku
| - RIV/68407700:21230/09:00164573
|
http://linked.open...riv/jazykVysledku
| |
http://linked.open.../riv/klicovaSlova
| - network behavior analysis; network intrusion detection; network security; hardware acceleration; collaborative approach (en)
|
http://linked.open.../riv/klicoveSlovo
| |
http://linked.open...odStatuVydavatele
| - CH - Švýcarská konfederace
|
http://linked.open...ontrolniKodProRIV
| |
http://linked.open...i/riv/nazevZdroje
| - International Journal of Electronic Security and Digital Forensics
|
http://linked.open...in/vavai/riv/obor
| |
http://linked.open...ichTvurcuVysledku
| |
http://linked.open...cetTvurcuVysledku
| |
http://linked.open...UplatneniVysledku
| |
http://linked.open...v/svazekPeriodika
| |
http://linked.open...iv/tvurceVysledku
| - Pěchouček, Michal
- Bartoš, Karel
- Grill, Martin
- Rehák, Martin
|
http://linked.open...n/vavai/riv/zamer
| |
issn
| |
number of pages
| |
http://localhost/t...ganizacniJednotka
| |
is http://linked.open...avai/riv/vysledek
of | |