Abstract
Wi-Fi is now ubiquitous in most populated areas, and the way the devices communicate leaves a lot of “digital exhaust”. Usually, a computer will have a Wi-Fi device that’s configured to connect to a given network, but often these devices can be configured instead to pick up the background Wi-Fi chatter of surrounding devices. There can always be good reasons as well as bad ones for the same, but the matter is all about the intensions. So, now imagine how many packets are flowing in a network and how harmful or useful they can be. Kee** the bad part aside, this can be used for ethical purpose as done in this work. This work follows certain steps to detect, analyze and then finally visualize the pattern of the network protocols or the data packets flowing. It also revolves around the analysis and hence, can be detected on a real-time basis.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Bailey M, Cooke E, Jahanian F, Nazario J, Watson D (2005) The internet motion sensor: a distributed blackhole monitoring system. In: Proceedings of network and distributed system security symposium (NDSS)
Xu G, Yu W, Chen Z, Zhang H, Moulema P, Fu X, Lu C (2015) A cloud computing-based system for cyber security management. Int J Parallel Emergent Distrib Syst 30(1):29–45
Yegneswaran V, Barford P, Jha S (2004) Global intrusion detection in the domino overlay system. In: Proceedings of the 11th IEEE network and distributed system security symposium (NDSS)
Yu W, Xu G, Chen Z, Moulema P (2013) A cloud computing-based architecture for cyber security situation awareness. In: Proceedings of 4th international workshop on security and privacy in cloud computing (SPCC)
Yu W, Zhang N, Fu X, Bettati R, Zhao W (2010) Location leakage of internet threat monitors: modeling and defense. IEEE Trans Comput (TC) 59(12):1655–1668
Guo H, Li Y, Jajodi S (2007) Chaining watermarks for detecting malicious modifications to streaming data. Inf Sci 177(1):281–298
Li X, Agrawal G (2005) Efficient evaluation of xquery over streaming data. In: Proceedings of the 31st international conference on very large data bases (VLDB)
Nehme RV, Rundensteiner EA, Bertino E (2008) A security punctuation framework for enforcing access control on streaming data. In: Proceedings of 24th international conference on data engineering (ICDE)
Zikopoulos P, Eaton C (2011) Understanding big data: analytics for enterprise class hadoop and streaming data
Guan Y, Fu X, Xuan D, Shenoy PU, Bettati R, Zhao W (2001) NetCamo: camouflaging network traffic for QoS-guaranteed mission critical applications. IEEE Trans Syst Man Cybern Part A: Syst Humans 31(4)
Eisenman SM, Fei X, Zhou X, Mahmassani HS (1964) Number and location of sensors for real-time network traffic estimation and prediction. Transp Res Rec J Transp Res Board 1:2006
Kim S, Reddy A (2005) A study of analyzing network traffic as images in real-time
Joshi MR, Hadi TH (2005) A review of network traffic analysis and prediction techniques. Computer Science
Khater N, Overill RE (2016) Network traffic classification techniques and challenges. In: Proceedings of 10th international conference on digital information management, pp 43–48
Ahrenholz J, Danilov C, Henderson T, Kim J (2008) CORE: a real-time network emulator
Dias K, Pongelupe M, Caminhas W, Errico L (2019) An innovative approach for real-time network traffic classification. Comput Netw 158:143–157
Liu L, ** X, Min G, Xu L (2012) Real-time diagnosis of network anomaly based on statistical traffic analysis
Cejka T, Bartos V, Svepes M, Rosa Z, Kubatova H (2016) NEMEA: a framework for network traffic analysis
Goodall JR, Lutters WG, Rheingans P, Komlodi A (2006) Focusing on context in network traffic analysis. IEEE Comput Graphics Appl 26(2):72–80
Karimi A, Niyaz Q, Sun W, Javaid A, Devabhaktuni V (2016) Distributed network traffic feature extraction for a real-time IDS. In: Proceedings of international conference on electro information technology, pp 522–526
Sullivan M, Heybey A (2021) Tribeca: a system for managing large databases of network Traac
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2024 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Gupta, Y., Saraswat, A., Goyal, S.K. (2024). Real-Time Network Traffic Analysis for Threat Detection. In: Goyal, S.K., Palwalia, D.K., Tiwari, R., Gupta, Y. (eds) Flexible Electronics for Electric Vehicles. FLEXEV 2022. Lecture Notes in Electrical Engineering, vol 1065. Springer, Singapore. https://doi.org/10.1007/978-981-99-4795-9_36
Download citation
DOI: https://doi.org/10.1007/978-981-99-4795-9_36
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-99-4794-2
Online ISBN: 978-981-99-4795-9
eBook Packages: EnergyEnergy (R0)