All

What are you looking for?

All
Projects
Results
Organizations

Quick search

  • Projects supported by TA ČR
  • Excellent projects
  • Projects with the highest public support
  • Current projects

Smart search

  • That is how I find a specific +word
  • That is how I leave the -word out of the results
  • “That is how I can find the whole phrase”

IFS: Intelligent flow sampling for network security–an adaptive approach

The result's identifiers

  • Result code in IS VaVaI

    <a href="https://www.isvavai.cz/riv?ss=detail&h=RIV%2F68407700%3A21230%2F15%3A00230859" target="_blank" >RIV/68407700:21230/15:00230859 - isvavai.cz</a>

  • Result on the web

    <a href="http://onlinelibrary.wiley.com/doi/10.1002/nem.1902/full" target="_blank" >http://onlinelibrary.wiley.com/doi/10.1002/nem.1902/full</a>

  • DOI - Digital Object Identifier

    <a href="http://dx.doi.org/10.1002/nem.1902" target="_blank" >10.1002/nem.1902</a>

Alternative languages

  • Result language

    angličtina

  • Original language name

    IFS: Intelligent flow sampling for network security–an adaptive approach

  • Original language description

    In order to cope with an increasing volume of network traffic, flow sampling methods are deployed to reduce the volume of log data stored for monitoring, attack detection, and forensic purposes. Sampling frequently changes the statistical properties of the data and can reduce the effectiveness of subsequent analysis or processing. We propose two concepts that mitigate the negative impact of sampling on the data. Late sampling is based on a simple idea that the features used by the analytic algorithms can be extracted before the sampling and attached to the surviving flows. The surviving flows thus carry the representation of the original statistical distribution in these attached features. The second concept we introduce is that of adaptive sampling. Adaptive sampling deliberatively skews the distribution of the surviving data to overrepresent the rare flows or flows with rare feature values. This preserves the variability of the data and is critical for the analysis of malicious traffic, such as the detection of stealthy, hidden threats. Our approach has been extensively validated on standard NetFlow data, as well as on HTTP proxy logs that approximate the use-case of enriched IPFIX for the network forensics.

  • Czech name

  • Czech description

Classification

  • Type

    J<sub>x</sub> - Unclassified - Peer-reviewed scientific article (Jimp, Jsc and Jost)

  • CEP classification

    JC - Computer hardware and software

  • OECD FORD branch

Result continuities

  • Project

    <a href="/en/project/VG20122014079" target="_blank" >VG20122014079: Behavioral Detection of Advanced Persistent Threats in Computer Networks</a><br>

  • Continuities

    P - Projekt vyzkumu a vyvoje financovany z verejnych zdroju (s odkazem do CEP)

Others

  • Publication year

    2015

  • Confidentiality

    S - Úplné a pravdivé údaje o projektu nepodléhají ochraně podle zvláštních právních předpisů

Data specific for result type

  • Name of the periodical

    International Journal of Network Management

  • ISSN

    1055-7148

  • e-ISSN

  • Volume of the periodical

    25

  • Issue of the periodical within the volume

    5

  • Country of publishing house

    US - UNITED STATES

  • Number of pages

    20

  • Pages from-to

    263-282

  • UT code for WoS article

    000360842100002

  • EID of the result in the Scopus database

    2-s2.0-84941170376