2017
DOI: 10.24846/v26i4y201702
|View full text |Cite
|
Sign up to set email alerts
|

Network Traffic Anomaly Detection Using Shallow Packet Inspection and Parallel K-means Data Clustering

Abstract: IT infrastructures around the world are targeted by malicious entities that want to steal data or compromise services. Protection measures for complex computer networks are expensive to deploy and maintain, and often do not offer protection against zero-day exploits. In-depth analysis of incoming and outgoing traffic can be problematic from legal and technical perspectives. The current work explores the possibility of implementing reliable security measures using machine learning algorithms to perform traffic … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
3
3
1

Relationship

0
7

Authors

Journals

citations
Cited by 11 publications
(2 citation statements)
references
References 11 publications
0
2
0
Order By: Relevance
“…Le et al leverage the PCAPNG file format in AntMonitor, a system for monitoring mobile devices, to attach mobile application names to raw packets [40]. Velea et al also leverage the PCAPNG traffic capture format to encode pre-processed feature information, such as the use of encryption, the protocol, and the number of packets in a flow using a custom-developed block option [82,83]. In contrast to these works, our work focuses on building a generalizable system for network traffic analysis tasks by encoding arbitrary metadata onto packets.…”
Section: Related Workmentioning
confidence: 99%
“…Le et al leverage the PCAPNG file format in AntMonitor, a system for monitoring mobile devices, to attach mobile application names to raw packets [40]. Velea et al also leverage the PCAPNG traffic capture format to encode pre-processed feature information, such as the use of encryption, the protocol, and the number of packets in a flow using a custom-developed block option [82,83]. In contrast to these works, our work focuses on building a generalizable system for network traffic analysis tasks by encoding arbitrary metadata onto packets.…”
Section: Related Workmentioning
confidence: 99%
“…Many security applications claim to rely on a basic mechanism, which means that vehicles continuously transmit security messages [3], [4,16]. These safety messages contain the knowledge about the present status of the vehicles, such as the speed, direction, position and acceleration [5,35].…”
Section: Introductionmentioning
confidence: 99%