Abstract
The network traffic generated by a computer, or a pair of computers, is often well modelled as a series of sessions. These are, roughly speaking, intervals of time during which a computer is engaging in the same, continued, activity. This article explores a variety of statistical approaches to re-discovering sessions from network flow data using timing alone. Solutions to this problem are essential for network monitoring and cyber-security. For example overlapping sessions on a computer network can be evidence of an intruder 'tunnelling'.
Original language | English |
---|---|
Pages | 244-247 |
Number of pages | 4 |
DOIs | |
Publication status | Published - 26 Sept 2014 |
Event | Intelligence and Security Informatics Conference (JISIC), 2014 IEEE Joint - The Hague, Netherlands Duration: 24 Sept 2014 → 26 Sept 2014 |
Conference
Conference | Intelligence and Security Informatics Conference (JISIC), 2014 IEEE Joint |
---|---|
Country/Territory | Netherlands |
City | The Hague |
Period | 24/09/14 → 26/09/14 |
Bibliographical note
Print ISBN: 978-1-4799-6363-8Keywords
- Big Data
- Cyber Security