NetFlow Monitoring and Cyberattack Detection Using Deep Learning With Ceph
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Yang, Chao-Tung | - |
dc.contributor.author | Liu, Jung-Chun | - |
dc.contributor.author | Kristiani, Endah | - |
dc.contributor.author | Liu, Ming-Lun | - |
dc.contributor.author | You, Ilsun | - |
dc.contributor.author | Pau, Giovanni | - |
dc.date.accessioned | 2021-08-11T08:43:54Z | - |
dc.date.available | 2021-08-11T08:43:54Z | - |
dc.date.issued | 2020 | - |
dc.identifier.issn | 2169-3536 | - |
dc.identifier.uri | https://scholarworks.bwise.kr/sch/handle/2021.sw.sch/3727 | - |
dc.description.abstract | Figuring the network & x2019;s hidden abnormal behavior can reduce network vulnerability. This paper presents a detailed architecture in which the collected log data of the network can be processed and analyzed. We process and integrate on-campus network information from every router and store the integrated NetFlow log data. Ceph is used as an open-source distributed storage platform that offers high efficiency, high reliability, scalability, and preliminary preprocessing of raw data with Python, removing redundant areas and unification. In the subanalysis, we discover the anomaly event and absolute flow by three times of standard deviation rule. Keras has been used to classify in-time data collected via a cyber-attack and to construct an automatic identifier template through the Recurring Neural Network (RNN) test. The identification accuracy of the optimization model is around 98 & x0025; in attack detection. Finally, in the MySQL server, the results of the real-time evaluation can be obtained, and the results of the assessment can be displayed via ECharts. | - |
dc.format.extent | 9 | - |
dc.language | 영어 | - |
dc.language.iso | ENG | - |
dc.publisher | Institute of Electrical and Electronics Engineers Inc. | - |
dc.title | NetFlow Monitoring and Cyberattack Detection Using Deep Learning With Ceph | - |
dc.type | Article | - |
dc.publisher.location | 미국 | - |
dc.identifier.doi | 10.1109/ACCESS.2019.2963716 | - |
dc.identifier.scopusid | 2-s2.0-85078323267 | - |
dc.identifier.wosid | 000525422700090 | - |
dc.identifier.bibliographicCitation | IEEE Access, v.8, pp 7842 - 7850 | - |
dc.citation.title | IEEE Access | - |
dc.citation.volume | 8 | - |
dc.citation.startPage | 7842 | - |
dc.citation.endPage | 7850 | - |
dc.type.docType | Article | - |
dc.description.isOpenAccess | Y | - |
dc.description.journalRegisteredClass | scie | - |
dc.description.journalRegisteredClass | scopus | - |
dc.relation.journalResearchArea | Computer Science | - |
dc.relation.journalResearchArea | Engineering | - |
dc.relation.journalResearchArea | Telecommunications | - |
dc.relation.journalWebOfScienceCategory | Computer Science, Information Systems | - |
dc.relation.journalWebOfScienceCategory | Engineering, Electrical & Electronic | - |
dc.relation.journalWebOfScienceCategory | Telecommunications | - |
dc.subject.keywordPlus | ANOMALY DETECTION | - |
dc.subject.keywordAuthor | Data storage | - |
dc.subject.keywordAuthor | ceph | - |
dc.subject.keywordAuthor | deep learning | - |
dc.subject.keywordAuthor | cyberattack | - |
dc.subject.keywordAuthor | netflow log | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
(31538) 22, Soonchunhyang-ro, Asan-si, Chungcheongnam-do, Republic of Korea+82-41-530-1114
COPYRIGHT 2021 by SOONCHUNHYANG UNIVERSITY ALL RIGHTS RESERVED.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.