Have a personal or library account? Click to login
An Analytical Framework for Data Collection and Analysis in IP Network Cover

An Analytical Framework for Data Collection and Analysis in IP Network

Open Access
|Feb 2024

References

  1. KHANNA, P.: Connectography: mapping the global network revolution, Weidenfeld & Nicolson, No. 2016 (466) ISBN 978-1474604253 https://doi.org/10.1111/1468-2346.12768
  2. JAAFAR, G. A., et al.: Review of Recent Detection Methods for HTTP DDoS Attack, Journal of Computer Networks and Communications, grade. 2019 doi.org, No. 18 (1) 20191–10 https://doi.org/10.1155/2019/1283472
  3. ZIED, A. – PEKÁR, A.: NFStream, Computer Networks, grade. 204, No. 18 (2) 2022108719 https://doi.org/10.1016/j.comnet.2021.108719
  4. von SOLMS, R. – van NIEKERK, J.: From Information Security to Cyber Security, Computers & Security, grade. 38, No. 18 (10) 201397–102 https://doi.org/10.1016/j.cose.2013.04.004
  5. KILINCER, I. F., et al.: Machine Learning Methods for Cyber Security Intrusion Detection: Datasets and Comparative Study, Computer Networks, grade. 188, No. 18 (4) 2021107840 https://doi.org/10.1016/j.comnet.2021.107840
  6. VAJDA, D., et al.: Towards Machine Learning-based Anomaly Detection on Time-Series Data, Infocommunications journal, grade. 13, No. 18 (1) 202135–44 https://doi.org/10.36244/ICJ.2021.1.5
  7. PEKÁR, A., et al.: Adaptive Aggregation of Flow Records, Computing and Informatics, grade. 37, No. 1 (1) 2018142–164 https://doi.org/10.4149/cai_2018_1_142
  8. KHUMMANEE, S., et al.: Towards a new design of firewall: Anomaly elimination and fast verifying of firewall rules, The 2013 10th International Joint Conference on Computer Science and Software Engineering (JCSSE), Khon Kaen, Thailand 2013, No. 93-98 () doi:10.1109/JCSSE.2013.6567326
  9. PAPADAKI, M. – FURNELL, S.: IDS or IPS: What Is Best?, Network Security, grade. 2004 doi.org, No. 7 (7) 200415–19 https://doi.org/10.1016/S1353-4858(04)00106-0
  10. ASHOOR, A. S. – GORE, S.: Difference between Intrusion Detection System (IDS) and Intrusion Prevention System (IPS), In: Wyld, D.C., Wozniak, M., Chaki, N., Meghanathan, N., Nagamalai, D. (eds) Advances in Network Security and Applications CNSA 2011, No. Communications in Computer and Information Science (Springer, Berlin, Heidelberg) 2011196 https://doi.org/10.1007/978-3-642-22540-6_48
  11. CANETTI, R., et al.: Proactive security: Long-term protection against break-ins, RSA Laboratories’ CryptoBytes, No. 3 (1) 19971-8 https://www.researchgate.net/publication/2708104_Proactive_Security_Long-term_protection_against_break-ins
  12. GALINEC, D., et al.: Cybersecurity and Cyber Defence: National Level Strategic Approach, Automatika, grade. 58,č. 3 (Crossref) doi.org, No. 18 (7) 2017273–286 https://doi.org/10.1080/00051144.2017.1407022
  13. MILOSLAVSKAYA, N. – TOLSTOY, A.: Big Data, Fast Data and Data Lake Concepts, Procedia Computer Science 88, No. 2016 (300-305) ISSN 1877-0509 https://doi.org/10.1016/j.procs.2016.07.439
  14. MATHIS, Ch.: Data Lakes, Datenbank-Spektrum Jeju Island, No. Korea (South) (289) 20211610-1995 https://doi.org/10.1007/s13222-017-0272-7
  15. CUZZOCREA, A.: Big Data Lakes: Models, Frameworks, and Techniques, 2021 IEEE International Conference on Big Data and Smart Computing (Big-Comp) Jeju Island, No. Korea (South) () 20211-4 https://doi:10.1109/BigComp51126.2021.00010
  16. KONONENKO, O., et al.: Mining modern repositories with elasticsearch., Proceedings of the 11th working conference on mining software repositories., No. () 2014328–331 https://doi.org/10.1145/2597073.2597091
DOI: https://doi.org/10.2478/aei-2023-0012 | Journal eISSN: 1338-3957 | Journal ISSN: 1335-8243
Language: English
Page range: 10 - 15
Submitted on: Jun 5, 2023
Accepted on: Nov 27, 2023
Published on: Feb 2, 2024
Published by: Technical University of Košice
In partnership with: Paradigm Publishing Services
Publication frequency: 4 issues per year

© 2024 Matúš Čavojský, Martin Hasin, Gabriel Bugár, published by Technical University of Košice
This work is licensed under the Creative Commons Attribution 4.0 License.