Network Attack Traffic Detection for Calculating Correlation of the Flow

Jee-Tae Park,Young-Hoon Goo,Kyu-Seok Shim,Ui-Jun Baek,Myung-Sup Kim

Published 2018 in Information and Communication Technology Convergence

ABSTRACT

As the propagation of high-speed Internet and the rapid development of the network environment have led to an increase of various types of attack traffic. To cope with the various types of attack traffic, it is essential to detect these traffic accurately. There are many ways to detect traffic, and the most common methods are signature-based analysis and machine learning-based analysis. Both methods have the advantage of being able to detect with high accuracy, but both methods have several limitations in processing. In this paper, we propose a classification method with sequential grouping based on correlation of the flow. The proposed method is a method of calculating the correlation of two flows with the attack flow information, and then detecting the related attack flow based on that. As a result of applying the proposed method to real attack traffic, we could detect with high accuracy.

PUBLICATION RECORD

CITATION MAP

EXTRACTION MAP

CLAIMS

  • No claims are published for this paper.

CONCEPTS

  • No concepts are published for this paper.

CITED BY

  • No citing papers are available for this paper.

Showing 0-0 of 0 citing papers · Page 1 of 1