Open Access

An Analytical Framework for Data Collection and Analysis in IP Network


Cite

KHANNA, P.: Connectography: mapping the global network revolution, Weidenfeld & Nicolson, No. 2016 (466) ISBN 978-1474604253 https://doi.org/10.1111/1468-2346.12768Search in Google Scholar

JAAFAR, G. A., et al.: Review of Recent Detection Methods for HTTP DDoS Attack, Journal of Computer Networks and Communications, grade. 2019 doi.org, No. 18 (1) 20191–10 https://doi.org/10.1155/2019/1283472Search in Google Scholar

ZIED, A. – PEKÁR, A.: NFStream, Computer Networks, grade. 204, No. 18 (2) 2022108719 https://doi.org/10.1016/j.comnet.2021.108719Search in Google Scholar

von SOLMS, R. – van NIEKERK, J.: From Information Security to Cyber Security, Computers & Security, grade. 38, No. 18 (10) 201397–102 https://doi.org/10.1016/j.cose.2013.04.004Search in Google Scholar

KILINCER, I. F., et al.: Machine Learning Methods for Cyber Security Intrusion Detection: Datasets and Comparative Study, Computer Networks, grade. 188, No. 18 (4) 2021107840 https://doi.org/10.1016/j.comnet.2021.107840Search in Google Scholar

VAJDA, D., et al.: Towards Machine Learning-based Anomaly Detection on Time-Series Data, Infocommunications journal, grade. 13, No. 18 (1) 202135–44 https://doi.org/10.36244/ICJ.2021.1.5Search in Google Scholar

PEKÁR, A., et al.: Adaptive Aggregation of Flow Records, Computing and Informatics, grade. 37, No. 1 (1) 2018142–164 https://doi.org/10.4149/cai_2018_1_142Search in Google Scholar

KHUMMANEE, S., et al.: Towards a new design of firewall: Anomaly elimination and fast verifying of firewall rules, The 2013 10th International Joint Conference on Computer Science and Software Engineering (JCSSE), Khon Kaen, Thailand 2013, No. 93-98 () doi:10.1109/JCSSE.2013.6567326Search in Google Scholar

PAPADAKI, M. – FURNELL, S.: IDS or IPS: What Is Best?, Network Security, grade. 2004 doi.org, No. 7 (7) 200415–19 https://doi.org/10.1016/S1353-4858(04)00106-0Search in Google Scholar

ASHOOR, A. S. – GORE, S.: Difference between Intrusion Detection System (IDS) and Intrusion Prevention System (IPS), In: Wyld, D.C., Wozniak, M., Chaki, N., Meghanathan, N., Nagamalai, D. (eds) Advances in Network Security and Applications CNSA 2011, No. Communications in Computer and Information Science (Springer, Berlin, Heidelberg) 2011196 https://doi.org/10.1007/978-3-642-22540-6_48Search in Google Scholar

CANETTI, R., et al.: Proactive security: Long-term protection against break-ins, RSA Laboratories’ CryptoBytes, No. 3 (1) 19971-8 https://www.researchgate.net/publication/2708104_Proactive_Security_Long-term_protection_against_break-insSearch in Google Scholar

GALINEC, D., et al.: Cybersecurity and Cyber Defence: National Level Strategic Approach, Automatika, grade. 58,č. 3 (Crossref) doi.org, No. 18 (7) 2017273–286 https://doi.org/10.1080/00051144.2017.1407022Search in Google Scholar

MILOSLAVSKAYA, N. – TOLSTOY, A.: Big Data, Fast Data and Data Lake Concepts, Procedia Computer Science 88, No. 2016 (300-305) ISSN 1877-0509 https://doi.org/10.1016/j.procs.2016.07.439Search in Google Scholar

MATHIS, Ch.: Data Lakes, Datenbank-Spektrum Jeju Island, No. Korea (South) (289) 20211610-1995 https://doi.org/10.1007/s13222-017-0272-7Search in Google Scholar

CUZZOCREA, A.: Big Data Lakes: Models, Frameworks, and Techniques, 2021 IEEE International Conference on Big Data and Smart Computing (Big-Comp) Jeju Island, No. Korea (South) () 20211-4 https://doi:10.1109/BigComp51126.2021.00010Search in Google Scholar

KONONENKO, O., et al.: Mining modern repositories with elasticsearch., Proceedings of the 11th working conference on mining software repositories., No. () 2014328–331 https://doi.org/10.1145/2597073.2597091Search in Google Scholar

eISSN:
1338-3957
Language:
English