Please use this identifier to cite or link to this item:
https://research.matf.bg.ac.rs/handle/123456789/2046
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Ibrahim, Juma | en_US |
dc.contributor.author | Timčenko, Valentina | en_US |
dc.contributor.author | Gajin, Slavko | en_US |
dc.date.accessioned | 2025-05-16T12:55:55Z | - |
dc.date.available | 2025-05-16T12:55:55Z | - |
dc.date.issued | 2019 | - |
dc.identifier.uri | https://research.matf.bg.ac.rs/handle/123456789/2046 | - |
dc.description.abstract | The network behavior analysis relies on the understanding of normal or acceptable behavior characteristics in the network communication, in order to efficiently detect the anomalous traffic patterns and deviations that could cause performance issues or indicate a breach, thus allowing near real-time alerting and visibility of the potential network security threats. In contrast to the signature based intrusion detection systems, this approach is extremely beneficial not only for identifying unknown threats, zero-day attacks, and suspicious behavior regardless the used cryptographic methodology, but also to identify and allow the performance optimization opportunities. We propose a comprehensive architecture for practical implementation of the flow based anomaly detection solution for real life use cases, which is based on the combination of the entropy calculation and machine learning techniques, with the ability to model the attacks and generate representative labelled training data set. | en_US |
dc.language.iso | en | en_US |
dc.publisher | Beograd : Informaciono društvo Srbije | en_US |
dc.title | A comprehensive flow-based anomaly detection architecture using entropy calculation and machine learning classification | en_US |
dc.type | Conference Object | en_US |
dc.relation.conference | International Conference on Information Society and Technology-ICIST 2019(9 ; 2019 ; Kopaonik) | en_US |
dc.relation.publication | Proceedings of the 9th International Conference on Information Society and Technology | en_US |
dc.identifier.url | https://www.eventiotic.com/eventiotic/library/paper/466 | - |
dc.relation.isbn | 978-86-85525-24-7 | en_US |
dc.description.rank | M33 | en_US |
dc.relation.firstpage | 138 | en_US |
dc.relation.lastpage | 143 | en_US |
item.cerifentitytype | Publications | - |
item.languageiso639-1 | en | - |
item.openairetype | Conference Object | - |
item.fulltext | No Fulltext | - |
item.openairecristype | http://purl.org/coar/resource_type/c_18cf | - |
item.grantfulltext | none | - |
crisitem.author.orcid | 0000-0002-8939-3589 | - |
Appears in Collections: | Research outputs |
Google ScholarTM
Check
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.