Overload-resistant Network Traffic Analysis
The result's identifiers
Result code in IS VaVaI
<a href="https://www.isvavai.cz/riv?ss=detail&h=RIV%2F68407700%3A21240%2F16%3A00300038" target="_blank" >RIV/68407700:21240/16:00300038 - isvavai.cz</a>
Result on the web
—
DOI - Digital Object Identifier
—
Alternative languages
Result language
angličtina
Original language name
Overload-resistant Network Traffic Analysis
Original language description
Flow-based monitoring is currently a leading approach of network security analysis. A flow record is an aggregated information about network traffic. Since various network attacks use just a few packets per flow, the advantage of aggregation is seriously limited. As a side effect, monitoring infrastructure and analysis system are affected. This paper proposes an overload-resistant architecture of the detection system that would overcome high load of flow records in time of attack.
Czech name
—
Czech description
—
Classification
Type
D - Article in proceedings
CEP classification
JC - Computer hardware and software
OECD FORD branch
—
Result continuities
Project
—
Continuities
S - Specificky vyzkum na vysokych skolach
Others
Publication year
2016
Confidentiality
S - Úplné a pravdivé údaje o projektu nepodléhají ochraně podle zvláštních právních předpisů
Data specific for result type
Article name in the collection
Proceedings of the 4th Prague Embedded Systems Workshop
ISBN
978-80-01-05984-5
ISSN
—
e-ISSN
—
Number of pages
6
Pages from-to
53-58
Publisher name
ČVUT FIT, Katedra číslicového návrhu
Place of publication
Praha
Event location
Roztoky u Prahy
Event date
Jun 30, 2016
Type of event by nationality
WRD - Celosvětová akce
UT code for WoS article
—