2017 21st International Conference on Control Systems and Computer Science (CSCS) 2017
DOI: 10.1109/cscs.2017.49
|View full text |Cite
|
Sign up to set email alerts
|

Feature Extraction and Visualization for Network PcapNg Traces

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3

Citation Types

0
3
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(3 citation statements)
references
References 15 publications
0
3
0
Order By: Relevance
“…Le et al leverage the PCAPNG file format in AntMonitor, a system for monitoring mobile devices, to attach mobile application names to raw packets [40]. Velea et al also leverage the PCAPNG traffic capture format to encode pre-processed feature information, such as the use of encryption, the protocol, and the number of packets in a flow using a custom-developed block option [82,83]. In contrast to these works, our work focuses on building a generalizable system for network traffic analysis tasks by encoding arbitrary metadata onto packets.…”
Section: Related Workmentioning
confidence: 99%
“…Le et al leverage the PCAPNG file format in AntMonitor, a system for monitoring mobile devices, to attach mobile application names to raw packets [40]. Velea et al also leverage the PCAPNG traffic capture format to encode pre-processed feature information, such as the use of encryption, the protocol, and the number of packets in a flow using a custom-developed block option [82,83]. In contrast to these works, our work focuses on building a generalizable system for network traffic analysis tasks by encoding arbitrary metadata onto packets.…”
Section: Related Workmentioning
confidence: 99%
“…There are some solutions published on network anomaly detection techniques [9], including studies incorporating machine learning in their solutions. There are also such studies that focus on anomaly detection in big-data related domains [10], [11]. In recent studies, many different techniques studied to solve the traffic classification problem.…”
Section: Related Workmentioning
confidence: 99%
“…There are some notable solutions published on network anomaly detection techniques [9],including studies incorporating machine learning in their solutions. There are also such studies that focus on anomaly detection in big-data related domains [10], [11]. In recent studies, many different techniques have been studied to solve the traffic classification problem.…”
Section: Related Workmentioning
confidence: 99%