Results 1 -
3 of
3
Collection and Exploration of Large Data Monitoring Sets Using Bitmap Databases
"... Abstract. Collecting and exploring monitoring data is becoming increasingly challenging as networks become larger and faster. Solutions based on both SQL-databases and specialized binary formats do not scale well as the amount of monitoring information increases. This paper presents a novel approach ..."
Abstract
-
Cited by 5 (2 self)
- Add to MetaCart
(Show Context)
Abstract. Collecting and exploring monitoring data is becoming increasingly challenging as networks become larger and faster. Solutions based on both SQL-databases and specialized binary formats do not scale well as the amount of monitoring information increases. This paper presents a novel approach to the problem by using a bitmap database that allowed the authors to implement an efficient solution for both data collection and retrieval. The validation process on production networks has demonstrated the advantage of the proposed solution over traditional approaches. This makes it suitable for efficiently handling and interactively exploring large data monitoring sets. Keywords: NetFlow, Flow Collection, Bitmap Databases. 1
Network attack detection at flow level
"... Abstract. In this paper, we propose a new method for detecting unau-thorized network intrusions, based on a traffic flow model and Cisco NetFlow protocol application. The method developed allows us not only to detect the most common types of network attack (DDoS and port scanning), but also to make ..."
Abstract
-
Cited by 2 (1 self)
- Add to MetaCart
(Show Context)
Abstract. In this paper, we propose a new method for detecting unau-thorized network intrusions, based on a traffic flow model and Cisco NetFlow protocol application. The method developed allows us not only to detect the most common types of network attack (DDoS and port scanning), but also to make a list of trespassers ’ IP-addresses. There-fore, this method can be applied in intrusion detection systems, and in those systems which lock these IP-addresses.
Detecting Cyber Attacks at Data Dribble
"... This research article proposes a new technique for detecting unauthorized network intrusions, based on a traffic flow model and Cisco NetFlow protocol application [1,2]. This technique allows us to detect the most common types of network attack (DDoS and port scanning) and most importantly make a li ..."
Abstract
- Add to MetaCart
This research article proposes a new technique for detecting unauthorized network intrusions, based on a traffic flow model and Cisco NetFlow protocol application [1,2]. This technique allows us to detect the most common types of network attack (DDoS and port scanning) and most importantly make a list of IP-addresses of trespassers. So, the technique can be used in intrusion detection systems, and in those systems which can track and lock these IP-addresses.