Self-adaptive sampling for network traffic measurement

Y Du, H Huang, YE Sun, S Chen… - IEEE INFOCOM 2021 …, 2021 - ieeexplore.ieee.org
Per-flow traffic measurement in the high-speed network plays an important role in many
practical applications. Due to the limited on-chip memory and the mismatch between off-chip …

Short-term memory sampling for spread measurement in high-speed networks

Y Du, H Huang, YE Sun, S Chen, G Gao… - … -IEEE Conference on …, 2022 - ieeexplore.ieee.org
Per-flow spread measurement in high-speed networks can provide indispensable
information to many practical applications. However, it is challenging to measure millions of …

Investigating the effect of traffic sampling on machine learning-based network intrusion detection approaches

J Alikhanov, R Jang, M Abuhamad, D Mohaisen… - IEEE …, 2021 - ieeexplore.ieee.org
Machine Learning (ML) based Network Intrusion Systems (NIDSs) operate on flow features
which are obtained from flow exporting protocols (ie, NetFlow). Recent success of ML and …

Minimizing Noise in HyperLogLog-Based Spread Estimation of Multiple Flows

DN Dao, R Jang, C Jung, D Mohaisen… - 2022 52nd Annual …, 2022 - ieeexplore.ieee.org
Cardinality estimation has become an essential building block of modern network
monitoring systems due to the increasing concerns of cyberattacks (eg, Denial-of-Service …

Comprehensive Analysis of the Intersection Between Cryptocurrency and Infrastructure Security

A Adeniran - 2024 - stars.library.ucf.edu
Cryptocurrencies are experiencing a significant surge, with the total valuation surpassing
two trillion US dollars at specific points. This remarkable growth is underscored by the …

Towards Scalable Network Traffic Measurement With Sketches

R Jang - 2020 - stars.library.ucf.edu
Driven by the ever-increasing data volume through the Internet, the per-port speed of
network devices reached 400 Gbps, and high-end switches are capable of processing 25.6 …

[PDF][PDF] 1 Recent Research Results

D Mohaisen - cs.ucf.edu
Broadly, my recent work has focused on networked systems security and privacy and
malicious software (malware) analysis, including detection and attribution. My work has …