Computer security
Fundamentals of Database Systems, Fourth Edition
Fundamentals of Database Systems, Fourth Edition
A NetFlow based flow analysis and monitoring system in enterprise networks
Computer Networks: The International Journal of Computer and Telecommunications Networking
Behavioural Characterization for Network Anomaly Detection
Transactions on Computational Science IV
NetFlow Based Intrusion Detection System
MMIT '08 Proceedings of the 2008 International Conference on MultiMedia and Information Technology
Computer Networking: A Top-Down Approach
Computer Networking: A Top-Down Approach
Network Security Bible
Hi-index | 0.00 |
The computers and network services became presence guaranteed in several places. These characteristics resulted in the growth of illicit events and therefore the computers and networks security has become an essential point in any computing environment. Many methodologies were created to identify these events; however, with increasing of users and services on the Internet, many difficulties are found in trying to monitor a large network environment. This paper proposes a methodology for events detection in large-scale networks. The proposal approaches the anomaly detection using the NetFlow protocol, statistical methods and monitoring the environment in a best time for the application.