2020
DOI: 10.1109/access.2019.2963716
|View full text |Cite
|
Sign up to set email alerts
|

NetFlow Monitoring and Cyberattack Detection Using Deep Learning With Ceph

Abstract: Figuring the network's hidden abnormal behavior can reduce network vulnerability. This paper presents a detailed architecture in which the collected log data of the network can be processed and analyzed. We process and integrate on-campus network information from every router and store the integrated NetFlow log data. Ceph is used as an open-source distributed storage platform that offers high efficiency, high reliability, scalability, and preliminary preprocessing of raw data with Python, removing redundant a… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
9
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
6
2

Relationship

1
7

Authors

Journals

citations
Cited by 19 publications
(9 citation statements)
references
References 19 publications
(23 reference statements)
0
9
0
Order By: Relevance
“…The authors in [10] refine that approach by defining the width according to the standard deviation of the noise of the time series-the difference between real and predicted values. Interestingly, the prediction is carried out through a trained Long Short-Term Memory (LSTM) neural network, similar to other works such as [11], [12]. We share their view of how the current trends of transferring machine-learning mechanisms to network problems are a good direction and, then, we embrace the approach of predicting traffic through neural networks.…”
Section: Introductionmentioning
confidence: 92%
“…The authors in [10] refine that approach by defining the width according to the standard deviation of the noise of the time series-the difference between real and predicted values. Interestingly, the prediction is carried out through a trained Long Short-Term Memory (LSTM) neural network, similar to other works such as [11], [12]. We share their view of how the current trends of transferring machine-learning mechanisms to network problems are a good direction and, then, we embrace the approach of predicting traffic through neural networks.…”
Section: Introductionmentioning
confidence: 92%
“…The current research shows that the network flow data can be effectively analyzed using various machine-learning techniques such as unsupervised clustering [8], Random-Forests (RF) [22], or deep learning [19]. The authors of [5] present a range of deep neural network topologies and test the influence of hyperpaprameter setups on the accuracy of the solution.…”
Section: Related Workmentioning
confidence: 99%
“…In opposite to that, in [19], the authors have adapted recurrent neural networks (RNN) with long short-term memory (LSTM) units on top of the NetFlow data. In addition to that they also used a flexible distributed architecture to handle the curation of large amount of data.…”
Section: Related Workmentioning
confidence: 99%
“…Some studies have focused on anomaly and abnormal traffic. Yang et al [82] built a model that found hidden abnormal traffic in the network to detect attacks using DL techniques. The dataset used was NetFlow campus information, which is a collection of data gathered by campus routers.…”
Section: Malicious Traffic Classificationmentioning
confidence: 99%