Mostrar el registro sencillo del ítem
dc.contributor | Escuela de Ingenierias Industrial, Informática y Aeroespacial | es_ES |
dc.contributor.author | Campazas Vega, Adrián | |
dc.contributor.author | Crespo Martínez, Ignacio Samuel | |
dc.contributor.author | Guerrero Higueras, Ángel Manuel | |
dc.contributor.author | Álvarez Aparicio, Claudia | |
dc.contributor.author | Matellán Olivera, Vicente | |
dc.contributor.other | Arquitectura y Tecnologia de Computadores | es_ES |
dc.date | 2021 | |
dc.date.accessioned | 2024-06-11T12:29:14Z | |
dc.date.available | 2024-06-11T12:29:14Z | |
dc.identifier.citation | Crespo-Martínez, I. S., Matellán, V., Guerrero-Higueras, Á. M., Campazas-Vega, A., & Álvarez-Aparicio, C. (2021). Analysis of NetFlow Features’ Importance in Malicious Network Traffic Detection. En 14th International Conference on Computational Intelligence in Security for Information Systems and 12th International Conference on European Transnational Educational (CISIS 2021 and ICEUTE 2021) (pp. 52-61). https://doi.org/10.1007/978-3-030-87872-6_6 | es_ES |
dc.identifier.isbn | 9783030878719 | es_ES |
dc.identifier.uri | https://hdl.handle.net/10612/21313 | |
dc.description.abstract | [EN] Malicious traffic detection allows for preventing cybersecurity-related threats. Machine learning algorithms are commonly used to detect such traffic in computer networks by analyzing packets. In wide-area networks, such as RedCAYLE (Red de Ciencia y Tecnolog´ıa de Castilla y Le´on), it is not possible to analyze every packet routed. So we pose that in such networks sampled flow data may be used to provide malicious traffic detection. This work presents the analysis carried out of the relevance that every NetFlow feature has in the K-Nearest Neighbors (KNN) algorithm in order to detect malicious traffic. Validation of the model has been carried out with real network data from RedCAYLE. Results show that it is necessary to train the models with sampled flow data. They also show that the nexthop feature has a negative influence on malicious traffic detection in wide-area networks such as RedCAYLE. | es_ES |
dc.language | eng | es_ES |
dc.publisher | Springer | es_ES |
dc.relation.ispartof | 14th International Conference on Computational Intelligence in Security for Information Systems and 12th International Conference on European Transnational Educational (CISIS 2021 and ICEUTE 2021) | es_ES |
dc.subject | Cibernética | es_ES |
dc.subject.other | Netflow features analysis | es_ES |
dc.subject.other | K-Nearest Neighbors (KNN) | es_ES |
dc.subject.other | Network traffic | es_ES |
dc.subject.other | Machine learning | es_ES |
dc.subject.other | Network security | es_ES |
dc.subject.other | Malicious traffic detection | es_ES |
dc.title | Analysis of NetFlow Features’ Importance in Malicious Network Traffic Detection | es_ES |
dc.type | info:eu-repo/semantics/conferenceProceedings | es_ES |
dc.rights.accessRights | info:eu-repo/semantics/openAccess | es_ES |
dc.page.initial | 53 | es_ES |
dc.page.final | 62 | es_ES |
dc.subject.unesco | 1207.03 Cibernética | es_ES |
dc.subject.unesco | 1203.17 Informática | es_ES |
Ficheros en el ítem
Este ítem aparece en la(s) siguiente(s) colección(ones)
-
Capítulos de monografías [1578]