Positional Packet Capture for Anomaly Detection in Multitenant Virtual Networks
International Journal of Network Management,
Год журнала:
2025,
Номер
35(2)
Опубликована: Янв. 29, 2025
ABSTRACT
Anomaly
detection
in
multitenant
virtual
networks
presents
significant
challenges
due
to
the
dynamic,
ephemeral
nature
of
virtualized
environments
and
complex
traffic
patterns
they
generate.
This
paper
a
definition
preferable
positions
within
enhance
anomaly
efficacy.
Leveraging
combination
overlay
underlay
capture
positions,
this
examines
strategic
impact
network
positioning
on
accuracy,
particularly
utilizing
software‐defined
networking
(SDN)
function
virtualization
(NFV).
Through
controlled
testing
with
realistic
attack
scenarios,
including
data
exfiltration,
denial
service,
malware
infiltration,
advantages
constraints
each
position
are
demonstrated.
The
findings
underscore
necessity
adaptable
mechanisms
address
variability
volume,
encapsulation
challenges,
privacy
concerns
unique
ecosystems.
further
introduces
cost
calculation
model
that
evaluates
by
weighting
key
factors,
enabling
an
optimized
trade‐off
between
accuracy
resource
efficiency.
derived
classification
positional
value
significantly
improves
real‐time
both
internal
external
threats
networks.
Язык: Английский
Utilizing Artificial Intelligence to Enhance Sensory Feedback in Prosthetic Limbs
Lecture notes in networks and systems,
Год журнала:
2025,
Номер
unknown, С. 227 - 241
Опубликована: Янв. 1, 2025
Язык: Английский
An Enhanced LSTM Approach for Detecting IoT-Based DDoS Attacks Using Honeypot Data
International Journal of Computational Intelligence Systems,
Год журнала:
2025,
Номер
18(1)
Опубликована: Фев. 5, 2025
Язык: Английский
Detecting and Analyzing Network Attacks: A Time-Series Analysis Using the Kitsune Dataset
Journal of Emerging Computer Technologies,
Год журнала:
2024,
Номер
5(1), С. 9 - 23
Опубликована: Ноя. 2, 2024
Network
security
is
a
critical
concern
in
today’s
digital
world,
requiring
efficient
methods
for
the
automatic
detection
and
analysis
of
cyber
attacks.
This
study
uses
Kitsune
Attack
Dataset
to
explore
network
traffic
behavior
IoT
devices
under
various
attack
scenarios,
including
ARP
MitM,
SYN
DoS,
Mirai
Botnet.
Utilizing
Python-based
data
tools,
we
preprocess
analyze
millions
packets
uncover
patterns
indicative
malicious
activities.
The
employs
packet-level
time-series
visualize
detect
anomalies
specific
each
type.
Key
findings
include
high
packet
volumes
attacks
such
as
SSDP
Flood
Botnet,
with
Botnet
involving
multiple
IP
addresses
lasting
over
2
hours.
Notable
attack-specific
behaviors
on
port
-1
targeted
ports
like
53195.
DoS
are
characterized
by
their
prolonged
durations,
suggesting
significant
disruption.
Overall,
highlights
distinctive
underscores
importance
understanding
these
characteristics
enhance
response
mechanisms.
Язык: Английский