A Survey on Network Security-Related Data Collection Technologies

dc.contributorAalto-yliopistofi
dc.contributorAalto Universityen
dc.contributor.authorLin, Huaqingen_US
dc.contributor.authorYan, Zhengen_US
dc.contributor.authorChen, Yuen_US
dc.contributor.authorZhang, Lifangen_US
dc.contributor.departmentDepartment of Communications and Networkingen
dc.contributor.organizationXidian Universityen_US
dc.contributor.organizationUniversity of California, Irvineen_US
dc.date.accessioned2018-05-22T14:41:23Z
dc.date.available2018-05-22T14:41:23Z
dc.date.issued2018en_US
dc.description.abstractSecurity threats and economic loss caused by network attacks, intrusions and vulnerabilities have motivated intensive studies on network security. Normally, data collected in a network system can reflect or can be used to detect security threats. We define these data as network security-related data. Studying and analyzing security-related data can help detect network attacks and intrusions, thus making it possible to further measure the security level of the whole network system. Obviously, the first step in detecting network attacks and intrusions is to collect security-related data. However, in the context of big data and 5G, there exist a number of challenges in collecting these security-related data. In this paper, we first briefly introduce network security-related data, including its definition and characteristics, and the applications of network data collection. We then provide the requirements and objectives for security-related data collection and present a taxonomy of data collection technologies. Moreover, we review existing collection nodes, collection tools and collection mechanisms in terms of network data collection and analyze them based on the proposed requirements and objectives towards high quality security-related data collection. Finally, we discuss open research issues and conclude with suggestions for future research directions.en
dc.description.versionPeer revieweden
dc.format.extent21
dc.format.mimetypeapplication/pdfen_US
dc.identifier.citationLin, H, Yan, Z, Chen, Y & Zhang, L 2018, 'A Survey on Network Security-Related Data Collection Technologies', IEEE Access, vol. 6, no. 1, pp. 18345-18365. https://doi.org/10.1109/ACCESS.2018.2817921en
dc.identifier.doi10.1109/ACCESS.2018.2817921en_US
dc.identifier.issn2169-3536
dc.identifier.otherPURE UUID: 83d745a5-533b-4a1d-b861-c00636110e68en_US
dc.identifier.otherPURE ITEMURL: https://research.aalto.fi/en/publications/83d745a5-533b-4a1d-b861-c00636110e68en_US
dc.identifier.otherPURE LINK: http://www.scopus.com/inward/record.url?scp=85044314369&partnerID=8YFLogxK
dc.identifier.otherPURE FILEURL: https://research.aalto.fi/files/19001394/lin_et_alIEEEAccess.pdfen_US
dc.identifier.urihttps://aaltodoc.aalto.fi/handle/123456789/31020
dc.identifier.urnURN:NBN:fi:aalto-201805222460
dc.language.isoenen
dc.publisherIEEE
dc.relation.ispartofseriesIEEE Accessen
dc.relation.ispartofseriesVolume 6, issue 1, pp. 18345-18365en
dc.rightsopenAccessen
dc.subject.keywordCommunication networksen_US
dc.subject.keywordData collectionen_US
dc.subject.keyworddata collection technologiesen_US
dc.subject.keywordIntrusion detectionen_US
dc.subject.keywordlarge-scale heterogeneous networksen_US
dc.subject.keywordMalwareen_US
dc.subject.keywordMonitoringen_US
dc.subject.keywordnetwork securityen_US
dc.subject.keywordsecurity-related dataen_US
dc.subject.keywordTelecommunication trafficen_US
dc.titleA Survey on Network Security-Related Data Collection Technologiesen
dc.typeA2 Katsausartikkeli tieteellisessä aikakauslehdessäfi
dc.type.versionpublishedVersion

Files