Please use this identifier to cite or link to this item: https://research.matf.bg.ac.rs/handle/123456789/1430
DC FieldValueLanguage
dc.contributor.authorGajin, Slavkoen_US
dc.date.accessioned2025-02-11T17:24:58Z-
dc.date.available2025-02-11T17:24:58Z-
dc.date.issued2022-
dc.identifier.urihttps://research.matf.bg.ac.rs/handle/123456789/1430-
dc.description.abstractWith a constantly increasing amount of encrypted network traffic and a new type of attack (“zero-day”), network traffic anomaly detection shows significant benefits over traditionally used signature-based packet inspection methods for cybersecurity attack detection. Using NetFlow or similar protocols is an attractive approach to providing accounting information about network communications due to its simplicity and applicability in a real-life network environment. Even though the basic set of information in flow data is not sufficient for efficient machine learning techniques, they are quite suitable for the application of entropy-based anomaly detection techniques. In this paper, we present comprehensive work in research, development and implementation of network traffic anomaly detection solutions based on the entropy of flow data. Starting from the well-known entropy-based approach, we reveal the results of our methodic work in solving the main challenges in designing an efficient anomaly detection solution empowered with the original classification method. Since the proof of concept was achieved in the laboratory environment using offline datasets, the solution has been implemented relying on the existing NetFlow Analyzer software product NetVizura. Even at the minimum viable product stage, the application confirms high performances and great applicability of the anomaly detection and classification method in real-life network environments.en_US
dc.language.isoenen_US
dc.subjectanomaly detectionen_US
dc.subjectanomaly classificationen_US
dc.subjectentropyen_US
dc.subjectnetwork behaviour analysisen_US
dc.titleNetwork traffic anomaly detection and analysis – from research to the implementationen_US
dc.typeConference Objecten_US
dc.relation.conferenceInternational Conference on Business Information Security BiSEC2022(13 ; 2022 ; Belgrade)en_US
dc.relation.publication13th International Conference on Business Information Security BISEC’2022 - Proceedingsen_US
dc.identifier.urlhttps://ceur-ws.org/Vol-3529/short_2.pdf-
dc.description.rankM33en_US
dc.relation.firstpage9en_US
dc.relation.lastpage10en_US
item.openairetypeConference Object-
item.fulltextNo Fulltext-
item.openairecristypehttp://purl.org/coar/resource_type/c_18cf-
item.grantfulltextnone-
item.languageiso639-1en-
item.cerifentitytypePublications-
crisitem.author.orcid0000-0002-8939-3589-
Appears in Collections:Research outputs
Show simple item record

Google ScholarTM

Check


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.