An overview of IP flow-based intrusion detection

A Sperotto, G Schaffrath, R Sadre… - … surveys & tutorials, 2010 - ieeexplore.ieee.org
Intrusion detection is an important area of research. Traditionally, the approach taken to find
attacks is to inspect the contents of every packet. However, packet inspection cannot easily …

Empowering network security with programmable switches: A comprehensive survey

X Chen, C Wu, X Liu, Q Huang, D Zhang… - … Surveys & Tutorials, 2023 - ieeexplore.ieee.org
With the growth of network applications such as 5G and artificial intelligence, network
security techniques, ie, the techniques that detect various attacks (eg, well-known denial-of …

Elastic sketch: Adaptive and fast network-wide measurements

T Yang, J Jiang, P Liu, Q Huang, J Gong… - Proceedings of the …, 2018 - dl.acm.org
When network is undergoing problems such as congestion, scan attack, DDoS attack, etc.,
measurements are much more important than usual. In this case, traffic characteristics …

Detecting unknown encrypted malicious traffic in real time via flow interaction graph analysis

C Fu, Q Li, K Xu - arxiv preprint arxiv:2301.13686, 2023 - arxiv.org
In this paper, we propose HyperVision, a realtime unsupervised machine learning (ML)
based malicious traffic detection system. Particularly, HyperVision is able to detect unknown …

Heavy-hitter detection entirely in the data plane

V Sivaraman, S Narayana, O Rottenstreich… - Proceedings of the …, 2017 - dl.acm.org
Identifying the" heavy hitter" flows or flows with large traffic volumes in the data plane is
important for several applications eg, flow-size aware routing, DoS detection, and traffic …

Sketchvisor: Robust network measurement for software packet processing

Q Huang, X **, PPC Lee, R Li, L Tang… - Proceedings of the …, 2017 - dl.acm.org
Network measurement remains a missing piece in today's software packet processing
platforms. Sketches provide a promising building block for filling this void by monitoring …

Detecting HTTP-based application layer DoS attacks on web servers in the presence of sampling

HH Jazi, H Gonzalez, N Stakhanova, AA Ghorbani - Computer Networks, 2017 - Elsevier
A recent escalation of application layer Denial of Service (DoS) attacks on the Internet has
quickly shifted the interest of the research community traditionally focused on network-based …

Packet transactions: High-level programming for line-rate switches

A Sivaraman, A Cheung, M Budiu, C Kim… - Proceedings of the …, 2016 - dl.acm.org
Many algorithms for congestion control, scheduling, network measurement, active queue
management, and traffic engineering require custom processing of packets in the data plane …

Data streams: Algorithms and applications

S Muthukrishnan - Foundations and Trends® in Theoretical …, 2005 - nowpublishers.com
In the data stream scenario, input arrives very rapidly and there is limited memory to store
the input. Algorithms have to work with one or few passes over the data, space less than …

Efficient computation of frequent and top-k elements in data streams

A Metwally, D Agrawal, A El Abbadi - International conference on …, 2005 - Springer
We propose an integrated approach for solving both problems of finding the most popular k
elements, and finding frequent elements in a data stream. Our technique is efficient and …