While more and more applications require higher network bandwidth, there is al-so a tendency that large portions of this bandwidth are misused for dubious purposes, such as unauthorized VoIP, file sharing, or criminal botnet activity. Automatic intru-sion detection methods can detect a large portion of such misuse, but novel patterns can only be detected by humans. Moreover, interpretation of large amounts of alerts imposes new challenges on the analysts. The goal of this paper is to present the vi-sual analysis system NFlowVis to interactively detect unwanted usage of the network infrastructure either by pivoting NetFlows using IDS alerts or by specifying usage pat-terns, such as sets of suspicious port numbers. Thereby, our work focuses o...
Abstract—DDoS attacks bring serious economic and technical damage to networks and enterprises. Timel...
With rising popularity of the internet there is also rising number of people misusing it. This thesi...
This thesis describes the use of NetFlow data in the systems for detection of disruptions or anomali...
While more and more applications require higher network bandwidth, there is al-so a tendency that la...
While more and more applications require higher network bandwidth, there is also a tendency that lar...
The computers and network services became presence guaranteed in several places. These characteristi...
Abstract. The importance of the Internet and our dependency on com-puter networks are steadily growi...
Networks are forwarding more and more data every year, thus its harder to reveal malicious traffic a...
As computer and network technologies evolve, the complexity of cybersecurity has dramatically increa...
Nowadays, computer networks have become incredibly complex due to the evolution of online services a...
Netflow data from a large public institution. The data indicate countries and network area from wher...
Current Network Scan Detection Systems (NSDS), usually im-plement detection schemes which depend on ...
Many network intrusion detection systems (NIDS) rely on protocol-specific analyzers to extract the h...
Today's networks face continuously arising new threats, making analysis of network data for the dete...
A botnet is one of the most dangerous forms of security issues. It infects unsecured computers and t...
Abstract—DDoS attacks bring serious economic and technical damage to networks and enterprises. Timel...
With rising popularity of the internet there is also rising number of people misusing it. This thesi...
This thesis describes the use of NetFlow data in the systems for detection of disruptions or anomali...
While more and more applications require higher network bandwidth, there is al-so a tendency that la...
While more and more applications require higher network bandwidth, there is also a tendency that lar...
The computers and network services became presence guaranteed in several places. These characteristi...
Abstract. The importance of the Internet and our dependency on com-puter networks are steadily growi...
Networks are forwarding more and more data every year, thus its harder to reveal malicious traffic a...
As computer and network technologies evolve, the complexity of cybersecurity has dramatically increa...
Nowadays, computer networks have become incredibly complex due to the evolution of online services a...
Netflow data from a large public institution. The data indicate countries and network area from wher...
Current Network Scan Detection Systems (NSDS), usually im-plement detection schemes which depend on ...
Many network intrusion detection systems (NIDS) rely on protocol-specific analyzers to extract the h...
Today's networks face continuously arising new threats, making analysis of network data for the dete...
A botnet is one of the most dangerous forms of security issues. It infects unsecured computers and t...
Abstract—DDoS attacks bring serious economic and technical damage to networks and enterprises. Timel...
With rising popularity of the internet there is also rising number of people misusing it. This thesi...
This thesis describes the use of NetFlow data in the systems for detection of disruptions or anomali...