Please use this identifier to cite or link to this item: https://research.matf.bg.ac.rs/handle/123456789/2046
DC FieldValueLanguage
dc.contributor.authorIbrahim, Jumaen_US
dc.contributor.authorTimčenko, Valentinaen_US
dc.contributor.authorGajin, Slavkoen_US
dc.date.accessioned2025-05-16T12:55:55Z-
dc.date.available2025-05-16T12:55:55Z-
dc.date.issued2019-
dc.identifier.urihttps://research.matf.bg.ac.rs/handle/123456789/2046-
dc.description.abstractThe network behavior analysis relies on the understanding of normal or acceptable behavior characteristics in the network communication, in order to efficiently detect the anomalous traffic patterns and deviations that could cause performance issues or indicate a breach, thus allowing near real-time alerting and visibility of the potential network security threats. In contrast to the signature based intrusion detection systems, this approach is extremely beneficial not only for identifying unknown threats, zero-day attacks, and suspicious behavior regardless the used cryptographic methodology, but also to identify and allow the performance optimization opportunities. We propose a comprehensive architecture for practical implementation of the flow based anomaly detection solution for real life use cases, which is based on the combination of the entropy calculation and machine learning techniques, with the ability to model the attacks and generate representative labelled training data set.en_US
dc.language.isoenen_US
dc.publisherBeograd : Informaciono društvo Srbijeen_US
dc.titleA comprehensive flow-based anomaly detection architecture using entropy calculation and machine learning classificationen_US
dc.typeConference Objecten_US
dc.relation.conferenceInternational Conference on Information Society and Technology-ICIST 2019(9 ; 2019 ; Kopaonik)en_US
dc.relation.publicationProceedings of the 9th International Conference on Information Society and Technologyen_US
dc.identifier.urlhttps://www.eventiotic.com/eventiotic/library/paper/466-
dc.relation.isbn978-86-85525-24-7en_US
dc.description.rankM33en_US
dc.relation.firstpage138en_US
dc.relation.lastpage143en_US
item.cerifentitytypePublications-
item.languageiso639-1en-
item.openairetypeConference Object-
item.fulltextNo Fulltext-
item.openairecristypehttp://purl.org/coar/resource_type/c_18cf-
item.grantfulltextnone-
crisitem.author.orcid0000-0002-8939-3589-
Appears in Collections:Research outputs
Show simple item record

Google ScholarTM

Check


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.