Please use this identifier to cite or link to this item:
https://research.matf.bg.ac.rs/handle/123456789/1430
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Gajin, Slavko | en_US |
dc.date.accessioned | 2025-02-11T17:24:58Z | - |
dc.date.available | 2025-02-11T17:24:58Z | - |
dc.date.issued | 2022 | - |
dc.identifier.uri | https://research.matf.bg.ac.rs/handle/123456789/1430 | - |
dc.description.abstract | With a constantly increasing amount of encrypted network traffic and a new type of attack (“zero-day”), network traffic anomaly detection shows significant benefits over traditionally used signature-based packet inspection methods for cybersecurity attack detection. Using NetFlow or similar protocols is an attractive approach to providing accounting information about network communications due to its simplicity and applicability in a real-life network environment. Even though the basic set of information in flow data is not sufficient for efficient machine learning techniques, they are quite suitable for the application of entropy-based anomaly detection techniques. In this paper, we present comprehensive work in research, development and implementation of network traffic anomaly detection solutions based on the entropy of flow data. Starting from the well-known entropy-based approach, we reveal the results of our methodic work in solving the main challenges in designing an efficient anomaly detection solution empowered with the original classification method. Since the proof of concept was achieved in the laboratory environment using offline datasets, the solution has been implemented relying on the existing NetFlow Analyzer software product NetVizura. Even at the minimum viable product stage, the application confirms high performances and great applicability of the anomaly detection and classification method in real-life network environments. | en_US |
dc.language.iso | en | en_US |
dc.subject | anomaly detection | en_US |
dc.subject | anomaly classification | en_US |
dc.subject | entropy | en_US |
dc.subject | network behaviour analysis | en_US |
dc.title | Network traffic anomaly detection and analysis – from research to the implementation | en_US |
dc.type | Conference Object | en_US |
dc.relation.conference | International Conference on Business Information Security BiSEC2022(13 ; 2022 ; Belgrade) | en_US |
dc.relation.publication | 13th International Conference on Business Information Security BISEC’2022 - Proceedings | en_US |
dc.identifier.url | https://ceur-ws.org/Vol-3529/short_2.pdf | - |
dc.description.rank | M33 | en_US |
dc.relation.firstpage | 9 | en_US |
dc.relation.lastpage | 10 | en_US |
item.openairetype | Conference Object | - |
item.fulltext | No Fulltext | - |
item.openairecristype | http://purl.org/coar/resource_type/c_18cf | - |
item.grantfulltext | none | - |
item.languageiso639-1 | en | - |
item.cerifentitytype | Publications | - |
crisitem.author.orcid | 0000-0002-8939-3589 | - |
Appears in Collections: | Research outputs |
Google ScholarTM
Check
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.