2019
DOI: 10.1109/comst.2018.2863942
|View full text |Cite
|
Sign up to set email alerts
|

Security Data Collection and Data Analytics in the Internet: A Survey

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
51
0

Year Published

2019
2019
2020
2020

Publication Types

Select...
5
4

Relationship

3
6

Authors

Journals

citations
Cited by 100 publications
(51 citation statements)
references
References 141 publications
(198 reference statements)
0
51
0
Order By: Relevance
“…Jing et al claimed that DDoS attacks mainly include direct DDoS attacks, reflective amplification DDoS attacks and link flooding attacks [30]. The data packets of direct DDoS attacks and reflective amplification DDoS attacks are similar, and many data packets come from the same flow.…”
Section: Traffic Casesmentioning
confidence: 99%
“…Jing et al claimed that DDoS attacks mainly include direct DDoS attacks, reflective amplification DDoS attacks and link flooding attacks [30]. The data packets of direct DDoS attacks and reflective amplification DDoS attacks are similar, and many data packets come from the same flow.…”
Section: Traffic Casesmentioning
confidence: 99%
“…In 2019, X. Jing et al [1] Network spasms are the main dangers for safe keeping over the web have involved special care. The honesty and interconnection of the network and the security exposures of protocols and software main to several and multilevel network spasms.…”
Section: Literature Surveymentioning
confidence: 99%
“…Now a days the internet plays a very major role in our daily life. In the present society the information is being received and misused by the people in that situation a lot of security threats arises [1]. 2 types of encryption in use, they are symmetric type and asymmetric type [4] i) Symmetric key: encryption using secret keys.…”
Section: Introductionmentioning
confidence: 99%
“…Although the methods to detect various attacks have been intensively researched and reported in the literature, none of them provide a thorough review on security data collection and data analytics for detecting mainstream attacks in WSNs. Some recent surveys focus on security data collection [93], [94] and data analytics in the Internet [92], Ad Hoc network [96], LTE/LTE-A network [97] and mobile phones [95], rather than WSN. Some surveys [6][7][8], [12] mainly focus on a limited number of typical attacks and lack detailed performance analysis under uniform criteria in WSN.…”
Section: Introductionmentioning
confidence: 99%