Similarity as a central approach to flow‐based anomaly detection

M Drašar, M Vizváry, J Vykopal - International Journal of …, 2014‏ - Wiley Online Library
Network flow monitoring is currently a common practice in mid‐and large‐size networks.
Methods of flow‐based anomaly detection are subject to ongoing extensive research …

[PDF][PDF] Behavioral detection of distributed dictionary attacks

M Drašar - … theses, dissertations, Masaryk University, Faculty of …, 2015‏ - is.muni.cz
The amount of network traffic has grown exponentially. Within this torrent of data, attacks are
plentiful. It is no longer possible to rely on methods of deep packet inspection to detect these …

[PDF][PDF] DETEKCE ANOM ALIÍ V SÍ ˇTOV EM PROVOZU

V Bartoš‏ - trilobit.fai.utb.cz
Práce se zabývá detekcı anomáliı v sıt'ovém provozu. Jsou diskutovány nekteré praktické
problémy výzkumu v této oblasti a je predstavena sada nástroju ulehcujıcıch rešenı techto …