The late detection of security threats causes a significant increase in the risk of irreparable damages, disabling any defense attempt. We propose a fast and adaptive Threat Detection and Prevention Architecture based on stream processing and machine learning algorithms. The proposed architecture combines the adaptability of online trained machine learning algorithms with the efficiency of batch trained methods. We create a dataset by capturing both legitimate and malicious traffic and compare two ways of combining packets into flows, one gathering all packets in a time window and the other analyzing only the first few packets of each flow. Besides our created dataset, we also analyze our proposal on real data composed of fixed-broadband In...
This work aims to research and analyze network flow intrusiondetection using seven machine learning ...
Attacks represent a serious threat to a network environment, and therefore need to be promptly detec...
As the Internet has become an enormous interconnected network, the information security today is ver...
Late detection of security breaches increases the risk of irreparable damages and limits any mitigat...
Submitted by Aglair Aguiar (aglair@ct.ufrj.br) on 2019-01-25T16:08:32Z No. of bitstreams: 1 866474...
The late detection of security threats causes a significant increase in the risk of irreparable dama...
The exponential development of telecommunications promotes the appearance of several applications th...
International audienceAttackers create new threats and constantly change their behavior to mislead s...
The increasing network speeds, number of attacks, and need for energy efficiency are pushing softwar...
PhD Thesis in Information Science and Technology submitted to the University of CoimbraComputer netw...
La détection tardive des menaces à la sécurité entraîne une augmentation significative du risque de ...
International audienceThe late detection of security threats causes a significant increase in the ri...
Intrusion Detection Systems (IDSs) help protect computer networks by identify and detect attempts to...
Machine Learning (ML) is seeing growing usage on Network Intrusion Detection Systems (NIDS) and allo...
In the security field, anomaly detection techniques have been developed to detect traffic patterns ...
This work aims to research and analyze network flow intrusiondetection using seven machine learning ...
Attacks represent a serious threat to a network environment, and therefore need to be promptly detec...
As the Internet has become an enormous interconnected network, the information security today is ver...
Late detection of security breaches increases the risk of irreparable damages and limits any mitigat...
Submitted by Aglair Aguiar (aglair@ct.ufrj.br) on 2019-01-25T16:08:32Z No. of bitstreams: 1 866474...
The late detection of security threats causes a significant increase in the risk of irreparable dama...
The exponential development of telecommunications promotes the appearance of several applications th...
International audienceAttackers create new threats and constantly change their behavior to mislead s...
The increasing network speeds, number of attacks, and need for energy efficiency are pushing softwar...
PhD Thesis in Information Science and Technology submitted to the University of CoimbraComputer netw...
La détection tardive des menaces à la sécurité entraîne une augmentation significative du risque de ...
International audienceThe late detection of security threats causes a significant increase in the ri...
Intrusion Detection Systems (IDSs) help protect computer networks by identify and detect attempts to...
Machine Learning (ML) is seeing growing usage on Network Intrusion Detection Systems (NIDS) and allo...
In the security field, anomaly detection techniques have been developed to detect traffic patterns ...
This work aims to research and analyze network flow intrusiondetection using seven machine learning ...
Attacks represent a serious threat to a network environment, and therefore need to be promptly detec...
As the Internet has become an enormous interconnected network, the information security today is ver...