Přístupnostní navigace
E-přihláška
Vyhledávání Vyhledat Zavřít
Detail publikace
PLUSKAL, J. RYŠAVÝ, O. MATOUŠEK, P.
Originální název
On the Identification of Applications from Captured Network Traffic
Typ
prezentace, poster
Jazyk
angličtina
Originální abstrakt
Digital forensics uses hashing as a tool to ensure data integrity and detecting known objects. Detecting know communication is more complicated as each data transfer contains specific and temporary characteristic, e.g., IP addresses, sequence numbers, and checksums. In network security, the anomaly or dangerous communication is identified by applying methods of traffic classification. In this presentation, we revisit the methods for traffic classification to determine an approach that can apply to the problem of distinguishing the traffic to known and suspect. Such classification can reduce the amount of information that needs to be analyzed by the forensic specialist during the investigation.
Klíčová slova
cyber forensics, cyber security, intrusion detection system, metadata, traffic classification
Autoři
PLUSKAL, J.; RYŠAVÝ, O.; MATOUŠEK, P.
Vydáno
30. 9. 2016
Místo
New York
Strany počet
15
URL
https://prezi.com/wnxlghgkocti
BibTex
@misc{BUT133042, author="Jan {Pluskal} and Ondřej {Ryšavý} and Petr {Matoušek}", title="On the Identification of Applications from Captured Network Traffic", year="2016", pages="15", address="New York", url="https://prezi.com/wnxlghgkocti", note="presentation, poster" }