Zobrazeno 1 - 10
of 1 925
pro vyhledávání: '"ipfix"'
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Autor:
Huták, Lukáš
This master's thesis addresses processing of flow monitoring records from a point of view of an IPFIX collector. It analysis the current solution of the modular collector, which went through considerable historical development, and focuses on reveali
Externí odkaz:
http://www.nusl.cz/ntk/nusl-385972
Publikováno v:
Tongxin xuebao, Vol 35, Pp 5-9 (2014)
An algorithm based on IPFIX network flow data is proposed.By using proposed algorithm,suspicious and abnormal DNS will be detected accurately,and DNS traffic amplification attack will be distinguished rapidly.This algorithm has been applied in the Ts
Externí odkaz:
https://doaj.org/article/7c7df37e061946c49f10ad733c03599e
Publikováno v:
Advances in Electrical and Electronic Engineering, Vol 12, Iss 4, Pp 325-333 (2014)
The main goal of VoIP services is to provide a reliable and high-quality voice transmission over packet networks. In order to prove the quality of VoIP transmission, several approaches were designed. In our approach, we are concerned about on-line mo
Externí odkaz:
https://doaj.org/article/0708f423014449c4b6060c9bdf84d81f
Publikováno v:
Tongxin xuebao, Vol 34, Pp 5-8 (2013)
To deal with the large-scale traffic capture and management in high speed network,the performance of IPFIX system was studied.An optimized architecture was proposed and implemented based on improved binary information integration to collect data and
Externí odkaz:
https://doaj.org/article/9a0fa3f6ac6949e299c52bd780aee177
Autor:
Arman Pashamokhtari, Norihiro Okui, Yutaka Miyake, Masataka Nakahara, Hassan Habibi Gharakheili
Publikováno v:
IEEE Internet of Things Journal. 10:5128-5145
Autor:
M. R. Mukhtarov
Publikováno v:
Безопасность информационных технологий, Vol 18, Iss 4, Pp 189-194 (2011)
The way of monitoring deviations in network traffic behavior inside “Cloud Infrastructure” using IPFIX protocol is suggested in the paper. The proposed algorithm is applied for registration of “Distributed Denial of Service” attacks against
Externí odkaz:
https://doaj.org/article/0209c032a2b9471697808bf060442eb0
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Publikováno v:
Le Journal de la Cybercriminalité & des Investigations Numériques, Vol 1, Iss 1, Pp 21-28 (2016)
The academic study of flow-based malware detection has primarily focused on NetFlow v5 and v9. In 2013 IPFIX was ratified as the flow export standard. As part of a larger project to develop protection methods for Cloud Service Providers from botnet t
Externí odkaz:
https://doaj.org/article/099f9e743cd646749745f8b5f6cd7d41
Autor:
Muhammad Iqbal, Toto Bachtiar Palokoto, A. A. N. Ananda Kusuma, Arfan Ridwan Hartawan, Tahar Agastani, Widrianto Sih Pinastiko
Publikováno v:
2022 International Conference on Radar, Antenna, Microwave, Electronics, and Telecommunications (ICRAMET).