变化(天文学)
方案(数学)
法医学
计算机科学
计算机安全
数学
生物
物理
遗传学
天体物理学
数学分析
作者
Nour Moustafa,Jill Slay
出处
期刊:Springer International Publishing eBooks
[Springer Nature]
日期:2018-01-03
卷期号:: 225-239
被引量:2
标识
DOI:10.1007/978-3-319-99277-8_13
摘要
Network forensic techniques help track cyber attacks by monitoring and analyzing network traffic. However, due to the large volumes of data in modern networks and sophisticated attacks that mimic normal behavior and/or erase traces to avoid detection, network attack investigations demand intelligent and efficient network forensic techniques. This chapter proposes a network forensic scheme for monitoring and investigating network-based attacks. The scheme captures and stores network traffic data, selects important network traffic features using the chi-square statistic and detects anomalous events using a novel correntropy-variation technique. An evaluation of the network forensic scheme employing the UNSW-NB15 dataset demonstrates its utility and high performance compared with three state-of-the-art approaches.
科研通智能强力驱动
Strongly Powered by AbleSci AI