2020 IEEE 25th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD) 2020
DOI: 10.1109/camad50429.2020.9209308
|View full text |Cite
|
Sign up to set email alerts
|

Head(er)Hunter: Fast Intrusion Detection using Packet Metadata Signatures

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
9
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
4
3

Relationship

4
3

Authors

Journals

citations
Cited by 9 publications
(9 citation statements)
references
References 21 publications
0
9
0
Order By: Relevance
“…Papadogiannaki et al [113,115] perform network intrusion detection by generating signatures from packet metadata sequences. They evaluate their methodology using the UNSW-NB15 dataset [104] that contains network traffic traces for numerous attacks.…”
Section: Intrusion Detectionmentioning
confidence: 99%
See 1 more Smart Citation
“…Papadogiannaki et al [113,115] perform network intrusion detection by generating signatures from packet metadata sequences. They evaluate their methodology using the UNSW-NB15 dataset [104] that contains network traffic traces for numerous attacks.…”
Section: Intrusion Detectionmentioning
confidence: 99%
“…Finally, Moustafa and Slay [104] build and make publicly available a handy dataset for network intrusion detection systems, namely, UNSW-NB15 [10]. This dataset is used for evaluation in [113,115]. As Anderson and McGrew [33] correctly point out, finding the most proper features for classification with high accuracy, recall, and precision, is not a trivial procedure, while it is highly dependable on the ground-truth dataset collection that is available each time.…”
Section: Datasetsmentioning
confidence: 99%
“…The contributions of this work are the following: (This is an extended version of the paper "Head (er) Hunter: Fast Intrusion Detection using Packet Metadata Signa-tures" [14] that was published in the proceedings of the 2020 IEEE 25th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD)):…”
Section: Incoming Traffic Collection Traffic Inspection Intrusion Detmentioning
confidence: 99%
“…The contributions of this work are the following: (This is an extended version of the paper “Head (er) Hunter: Fast Intrusion Detection using Packet Metadata Signatures” [ 14 ] that was published in the proceedings of the 2020 IEEE 25th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD)): We generate signatures for intrusion detection using strictly packet metadata extracted from packet headers, making our engine suitable for encrypted network traffic. More specifically, we focus on packet payload size and packet direction.…”
Section: Introductionmentioning
confidence: 99%
“…Network monitoring and security -Main lecture and educational material -Emulation of a virtual lab for secure network configuration and monitoring of networking traffic with the tool Head(er) Hunter [43] Networking manipulation and attacks, as well as secure configuration, administration, and operation, with a focus on continuous traffic monitoring and classification.…”
Section: The Iot-enabled Smart Home Use Case 61 Outlinementioning
confidence: 99%