2023
DOI: 10.1007/s10207-023-00703-0
|View full text |Cite
|
Sign up to set email alerts
|

An autoML network traffic analyzer for cyber threat detection

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
3
1
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(1 citation statement)
references
References 96 publications
0
1
0
Order By: Relevance
“…Network traffic analysis involves monitoring and inspecting network traffic patterns, data packets, and communication protocols to gain useful insights into the behavior of network users and identify any malicious activities [2]. By leveraging approaches such as deep packet inspection, flow analysis, and statistical anomaly detection, network traffic analysis allows for identifying suspicious activities, abnormal traffic patterns, and potential security breaches [3]. On the other hand, IDS is a security mechanism that monitors network traffic in real-time and compares it against a predefined set of attack signatures or behavioral patterns to detect and mitigate network attacks.…”
Section: Introductionmentioning
confidence: 99%
“…Network traffic analysis involves monitoring and inspecting network traffic patterns, data packets, and communication protocols to gain useful insights into the behavior of network users and identify any malicious activities [2]. By leveraging approaches such as deep packet inspection, flow analysis, and statistical anomaly detection, network traffic analysis allows for identifying suspicious activities, abnormal traffic patterns, and potential security breaches [3]. On the other hand, IDS is a security mechanism that monitors network traffic in real-time and compares it against a predefined set of attack signatures or behavioral patterns to detect and mitigate network attacks.…”
Section: Introductionmentioning
confidence: 99%