Network traffic screening using frequent sequential patterns

Hisashi Tsuruta, Takayoshi Shoudai, Jun'ichi Takeuchi

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Citations (Scopus)

Abstract

Darknet monitoring is very important for understanding various botnet activities for early detection and defense the threats on the Internet caused by the botnets. However, common illegal accesses by ordinary malware make such detection difficult. To remove such accesses by ordinary malware from the results of network monitoring, we propose a data screening method based on finding frequent sequential patterns that appear in given traffic data. We applied our method to traffic data observed in the darknet and report the results.

Original languageEnglish
Title of host publicationIntelligent Control and Innovative Computing
Pages363-375
Number of pages13
DOIs
Publication statusPublished - Jan 16 2012
EventInternational Conference on Advances in Intelligent Control and Innovative Computing - Hong Kong, Hong Kong
Duration: Mar 16 2011Mar 18 2011

Publication series

NameLecture Notes in Electrical Engineering
Volume110 LNEE
ISSN (Print)1876-1100
ISSN (Electronic)1876-1119

Other

OtherInternational Conference on Advances in Intelligent Control and Innovative Computing
CountryHong Kong
CityHong Kong
Period3/16/113/18/11

All Science Journal Classification (ASJC) codes

  • Industrial and Manufacturing Engineering

Fingerprint Dive into the research topics of 'Network traffic screening using frequent sequential patterns'. Together they form a unique fingerprint.

  • Cite this

    Tsuruta, H., Shoudai, T., & Takeuchi, J. (2012). Network traffic screening using frequent sequential patterns. In Intelligent Control and Innovative Computing (pp. 363-375). (Lecture Notes in Electrical Engineering; Vol. 110 LNEE). https://doi.org/10.1007/978-1-4614-1695-1_28