2016 IEEE 4th International Conference on Future Internet of Things and Cloud Workshops (FiCloudW) 2016
DOI: 10.1109/w-ficloud.2016.30
|View full text |Cite
|
Sign up to set email alerts
|

A Survey on Network Security Monitoring Systems

Abstract: Abstract-Network monitoring is a difficult and demanding task that is a vital part of a network administrator's job. Network administrators are constantly striving to maintain smooth operation of their networks. If a network were to be down even for a small period of time, productivity within a company would decline, and in the case of public service departments the ability to provide essential services would be compromised. There are different network security approaches. This paper provides the readers with … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
27
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
4
3
3

Relationship

3
7

Authors

Journals

citations
Cited by 57 publications
(30 citation statements)
references
References 7 publications
(3 reference statements)
0
27
0
Order By: Relevance
“…In the existing communication systems, the security is ensured via classical encryption techniques and other security algorithms that are implemented separately from the transmission [90,91]. Current security algorithms are implemented at the higher layers of the communication protocol, which adds more delay to the end-to-end latency.…”
Section: Security Issuesmentioning
confidence: 99%
“…In the existing communication systems, the security is ensured via classical encryption techniques and other security algorithms that are implemented separately from the transmission [90,91]. Current security algorithms are implemented at the higher layers of the communication protocol, which adds more delay to the end-to-end latency.…”
Section: Security Issuesmentioning
confidence: 99%
“…Elliptic Curve Cryptography (ECC) focuses on the security and privacy of data from potential hackers [3], [22], [23], [24]. ECC incorporates an RFID privacy model within the structure of authentication, this produces 4 new methods to be abided by to ensure safety and privacy of information stored.…”
Section: B Ecc Based Authenticationmentioning
confidence: 99%
“…Different security systems are used to monitor the network traffic [35] [36]. The DeFD module is implemented on top of the Bro [37] [35].…”
Section: Disguised Executable File Detection (Defd)mentioning
confidence: 99%