Zobrazeno 1 - 10
of 28
pro vyhledávání: '"Nabil Seddigh"'
Publikováno v:
Journal of Network and Systems Management. 29
Visibility into network traffic is a key requirement for different security and network monitoring tools. Recent trends in the evolution of Internet traffic present a challenge for traditional traffic analysis methods to achieve accurate classificati
Autor:
Serge Dolgikh, Biswajit Nandy, Naveen Sai Muthyala, Juhandre Knoetze, Don W. Bennett, Yonglin Ren, Nabil Seddigh, Colin Zeidler
Publikováno v:
CNSM
Traffic classification solutions are widely used by network operators and law enforcement agencies (LEA) for application identification. Widespread use of encryption reduces the accuracy of traditional traffic classification solutions such as DPI (De
Publikováno v:
CCECE
Industrial Control and SCADA (Supervisory Control and Data Acquisition) networks control critical infrastructure such as power plants, nuclear facilities, and water supply systems. These systems are increasingly the target of cyber attacks by threat
Publikováno v:
International Journal of Mobile Computing and Multimedia Communications. 6:17-53
Research into network anomaly detection has become crucial as a result of a significant increase in the number of computer attacks. Many approaches in network anomaly detection have been reported in the literature, but data or solutions typically are
Autor:
R. Makkar, Biswajit Nandy, Emmanouil Skevakis, Nabil Seddigh, Hassan Halabian, Ioannis Lambadaris, Athanasios Delimargas
Publikováno v:
MILCOM
As the number, complexity and diversity of cyber threats continue to increase in network infrastructures, anomaly detection techniques constitute a crucial alternative towards enhancing network security. Principal Component Analysis (PCA) is a widely
Research into network anomaly detection has become crucial as a result of a significant increase in the number of computer attacks. Many approaches in network anomaly detection have been reported in the literature, but data or solutions typically are
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::033d0eb54eeedc8ae01788b2b205d383
https://doi.org/10.4018/978-1-4666-7456-1.ch034
https://doi.org/10.4018/978-1-4666-7456-1.ch034
Publikováno v:
ICCC
Principal component analysis (PCA) has received increasing attention as a method to distinguish network traffic anomalies from normal data instances based on its orthogonal linear transformation characteristics and dimensionality reduction technique.
Publikováno v:
TrustCom
Fuzzy C-means (FCM) clustering has been used to distinguish communication network traffic outliers based on the uncommon statistical characteristics of network traffic data. The raditional FCM does not leverage spatial information in its analysis, wh
Publikováno v:
GIIS
Source routing and routing protocols are two well known methods used to discover network connectivity within IPv6 networks. The source routing discovery method faces the challenge of probing space explosion phenomenon which generates a large volume o