2018
DOI: 10.1016/j.future.2017.04.017
|View full text |Cite
|
Sign up to set email alerts
|

CoreFlow: Enriching Bro security events using network traffic monitoring data

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
9
0

Year Published

2018
2018
2020
2020

Publication Types

Select...
5
1

Relationship

1
5

Authors

Journals

citations
Cited by 13 publications
(10 citation statements)
references
References 14 publications
(23 reference statements)
0
9
0
Order By: Relevance
“…Ultimately, we envision that a responsible Internet enables the real-time sharing of measurements across network operators, allowing them to collaboratively fend off security incidents as they occur (e.g., by dynamically moving scrubbing functionality to a specific part of their network using Network Function Virtualization (NFV) [19]) or even proactively before they can cause real harm. Network operators could share the actual measurements in various ways, such as directly from their own servers or through a shared platform in which multiple operators upload their measurements (e.g., DDoS fingerprints [20,21]).…”
Section: Enabling Cross-network Operator Incident Analysismentioning
confidence: 99%
See 1 more Smart Citation
“…Ultimately, we envision that a responsible Internet enables the real-time sharing of measurements across network operators, allowing them to collaboratively fend off security incidents as they occur (e.g., by dynamically moving scrubbing functionality to a specific part of their network using Network Function Virtualization (NFV) [19]) or even proactively before they can cause real harm. Network operators could share the actual measurements in various ways, such as directly from their own servers or through a shared platform in which multiple operators upload their measurements (e.g., DDoS fingerprints [20,21]).…”
Section: Enabling Cross-network Operator Incident Analysismentioning
confidence: 99%
“…Similarly, network operators can proactively change their network (e.g., using VNF for fine-grained adaptations) because network descriptions of operators [ 20 , 50 ] provide them with a more comprehensive view on what is going on in the network (cf. Sect.…”
Section: More Internet Controllability Through the Network Configuratmentioning
confidence: 99%
“…The network data is stored in many multiple log files such as, HTTP log, DNS log, and SMTP log. 43 In our proposed framework, the BroIDS has been used to read the data sets from pcap files and retrieve the data in individual log files, which generates conventional real-time log files. This experiment has focused on HTTP log used to identify applications or services that perform HTTP requests.…”
Section: Broidsmentioning
confidence: 99%
“…BroIDS is an open source network security monitoring tool that helps to look into previously captured packet from captured files in real time. The network data is stored in many multiple log files such as, HTTP log, DNS log, and SMTP log 43 …”
Section: Proposed Frameworkmentioning
confidence: 99%
“…In particular, it is believed that the more important limitations of the current techniques are that first, the detections are done per connection and not per user, second, the classifiers are trained and tested on -only normal‖ and -only infected‖ datasets and third, the types of attacks and infections evolve and make classifiers quickly less useful. Apart from the more traditional signaturebased intrusion detection system (IDS), such as snort [2] and bro [3], there has been extensive research on behavioral detection methods during the last decade. From these new methods, the most used is anomaly detection techniques (ADTs) due to its easy implementation and understandability.…”
Section: Motivation and Introductionmentioning
confidence: 99%