This thesis describes the use of NetFlow data in the systems for detection of disruptions or anomalies in computer network traffic. Various methods for network data collection are described, focusing especially on the NetFlow protocol. Further, various methods for anomaly detection in network traffic are discussed and evaluated, and their advantages as well as disadvantages are listed. Based on this analysis one method is chosen. Further, test data set is analyzed using the method. Algorithm for real-time network traffic anomaly detection is designed based on the analysis outcomes. This method was chosen mainly because it enables detection of anomalies even in an unlabelled network traffic. The last part of the thesis describes implementat...
This work studies systems and methods for anomaly detection in computer networks. At first, basic ca...
Computer networks have nowadays assumed an increasingly important role in the expression of modern h...
This bachelor’s thesis deals with DNS anomaly detection in captured network traffic based on t...
This master thesis deals with detecting anomalies methods in network traffic. First of all this thes...
This diploma thesis describes several selected network attacks detection method using statistical mo...
The problem of traffic anomalies in computer networks is analyzed. NetFlow packets are used as netwo...
The problem of traffic anomalies in computer networks is analyzed. NetFlow packets are used as netwo...
This thesis deals with the possibility of greater security of network based on NetFlow protocol. Spe...
The problem of traffic anomalies in computer networks is analyzed. NetFlow packets are used as netwo...
The computers and network services became presence guaranteed in several places. These characteristi...
This thesis describes the design and implementation of system for effective detection of network ano...
This paper presents a method of identifying and classifying network anomalies using an artificial ne...
In the field of network security management, a number of recent researches have been dedicated to ne...
With rising popularity of the internet there is also rising number of people misusing it. This thesi...
The paper proposes how to detect network traffic anomalies through packet header data. In this the s...
This work studies systems and methods for anomaly detection in computer networks. At first, basic ca...
Computer networks have nowadays assumed an increasingly important role in the expression of modern h...
This bachelor’s thesis deals with DNS anomaly detection in captured network traffic based on t...
This master thesis deals with detecting anomalies methods in network traffic. First of all this thes...
This diploma thesis describes several selected network attacks detection method using statistical mo...
The problem of traffic anomalies in computer networks is analyzed. NetFlow packets are used as netwo...
The problem of traffic anomalies in computer networks is analyzed. NetFlow packets are used as netwo...
This thesis deals with the possibility of greater security of network based on NetFlow protocol. Spe...
The problem of traffic anomalies in computer networks is analyzed. NetFlow packets are used as netwo...
The computers and network services became presence guaranteed in several places. These characteristi...
This thesis describes the design and implementation of system for effective detection of network ano...
This paper presents a method of identifying and classifying network anomalies using an artificial ne...
In the field of network security management, a number of recent researches have been dedicated to ne...
With rising popularity of the internet there is also rising number of people misusing it. This thesi...
The paper proposes how to detect network traffic anomalies through packet header data. In this the s...
This work studies systems and methods for anomaly detection in computer networks. At first, basic ca...
Computer networks have nowadays assumed an increasingly important role in the expression of modern h...
This bachelor’s thesis deals with DNS anomaly detection in captured network traffic based on t...