NetFlow Monitoring and Cyberattack Detection Using Deep Learning With Ceph
Figuring the network's hidden abnormal behavior can reduce network vulnerability. This paper presents a detailed architecture in which the collected log data of the network can be processed and analyzed. We process and integrate on-campus network information from every router and store the inte...
Main Authors: | Chao-Tung Yang, Jung-Chun Liu, Endah Kristiani, Ming-Lun Liu, Ilsun You, Giovanni Pau |
---|---|
Format: | Article |
Language: | English |
Published: |
IEEE
2020-01-01
|
Series: | IEEE Access |
Subjects: | |
Online Access: | https://ieeexplore.ieee.org/document/8949457/ |
Similar Items
-
COLETA, TRATAMENTO E ARMAZENAMENTO DE FLUXOS NO PADRÃO NETFLOW
by: Vitor Ruiz, et al.
Published: (2016-06-01) -
COLETA, TRATAMENTO E ARMAZENAMENTO DE FLUXOS NO PADRÃO NETFLOW
by: Vitor Ruiz, et al.
Published: (2016-03-01) -
COLETA, TRATAMENTO E ARMAZENAMENTO DE FLUXOS NO PADRÃO NETFLOW
by: Vitor Ruiz, et al.
Published: (2016-06-01) -
Analysis of TCP flood attack using NetFlow
by: Vsevolod Kapustin, et al.
Published: (2023-07-01) -
CephArmor: A Lightweight Cryptographic Interface for Secure High-Performance Ceph Storage Systems
by: Fatemeh Khoda Parast, et al.
Published: (2022-01-01)