Flow based Sequential Grouping System for Malicious Traffic Detection
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Park, Jee-Tae | - |
dc.contributor.author | Baek, Ui-Jun | - |
dc.contributor.author | Lee, Min-Seong | - |
dc.contributor.author | Goo, Young-Hoon | - |
dc.contributor.author | Lee, Sung-Ho | - |
dc.contributor.author | Kim, Myung-Sup | - |
dc.date.accessioned | 2022-02-16T14:41:38Z | - |
dc.date.available | 2022-02-16T14:41:38Z | - |
dc.date.created | 2022-02-08 | - |
dc.date.issued | 2021-10-31 | - |
dc.identifier.issn | 1976-7277 | - |
dc.identifier.uri | https://scholar.korea.ac.kr/handle/2021.sw.korea/135990 | - |
dc.description.abstract | With the rapid development of science and technology, several high-performance networks have emerged with various new applications. Consequently, financially or socially motivated attacks on specific networks have also steadily become more complicated and sophisticated. To reduce the damage caused by such attacks, administration of network traffic flow in real-time and precise analysis of past attack traffic have become imperative. Although various traffic analysis methods have been studied recently, they continue to suffer from performance limitations and are generally too complicated to apply in existing systems. To address this problem, we propose a method to calculate the correlation between the malicious and normal flows and classify attack traffics based on the corresponding correlation values. In order to evaluate the performance of the proposed method, we conducted several experiments using examples of real malicious traffic and normal traffic. The evaluation was performed with respect to three metrics: recall, precision, and f-measure. The experimental results verified high performance of the proposed method with respect to first two metrics. | - |
dc.language | English | - |
dc.language.iso | en | - |
dc.publisher | KSII-KOR SOC INTERNET INFORMATION | - |
dc.subject | INTRUSION DETECTION | - |
dc.subject | CLASSIFICATION | - |
dc.title | Flow based Sequential Grouping System for Malicious Traffic Detection | - |
dc.type | Article | - |
dc.contributor.affiliatedAuthor | Kim, Myung-Sup | - |
dc.identifier.doi | 10.3837/tiis.2021.10.016 | - |
dc.identifier.scopusid | 2-s2.0-85119011789 | - |
dc.identifier.wosid | 000714446400016 | - |
dc.identifier.bibliographicCitation | KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, v.15, no.10, pp.3771 - 3792 | - |
dc.relation.isPartOf | KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS | - |
dc.citation.title | KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS | - |
dc.citation.volume | 15 | - |
dc.citation.number | 10 | - |
dc.citation.startPage | 3771 | - |
dc.citation.endPage | 3792 | - |
dc.type.rims | ART | - |
dc.type.docType | Article | - |
dc.identifier.kciid | ART002770939 | - |
dc.description.journalClass | 1 | - |
dc.description.journalRegisteredClass | scie | - |
dc.description.journalRegisteredClass | scopus | - |
dc.description.journalRegisteredClass | kci | - |
dc.relation.journalResearchArea | Computer Science | - |
dc.relation.journalResearchArea | Telecommunications | - |
dc.relation.journalWebOfScienceCategory | Computer Science, Information Systems | - |
dc.relation.journalWebOfScienceCategory | Telecommunications | - |
dc.subject.keywordPlus | CLASSIFICATION | - |
dc.subject.keywordPlus | INTRUSION DETECTION | - |
dc.subject.keywordAuthor | Flow Correlation Index | - |
dc.subject.keywordAuthor | Flow Information | - |
dc.subject.keywordAuthor | Malicious Traffic Detection | - |
dc.subject.keywordAuthor | Traffic Classification | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
(02841) 서울특별시 성북구 안암로 14502-3290-1114
COPYRIGHT © 2021 Korea University. All Rights Reserved.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.