Real-Time Network Traffic Analysis for Threat Detection

  • Conference paper
  • First Online:
Flexible Electronics for Electric Vehicles (FLEXEV 2022)

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 1065))

Included in the following conference series:

  • 277 Accesses

Abstract

Wi-Fi is now ubiquitous in most populated areas, and the way the devices communicate leaves a lot of “digital exhaust”. Usually, a computer will have a Wi-Fi device that’s configured to connect to a given network, but often these devices can be configured instead to pick up the background Wi-Fi chatter of surrounding devices. There can always be good reasons as well as bad ones for the same, but the matter is all about the intensions. So, now imagine how many packets are flowing in a network and how harmful or useful they can be. Kee** the bad part aside, this can be used for ethical purpose as done in this work. This work follows certain steps to detect, analyze and then finally visualize the pattern of the network protocols or the data packets flowing. It also revolves around the analysis and hence, can be detected on a real-time basis.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
EUR 32.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or Ebook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 229.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 299.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free ship** worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Bailey M, Cooke E, Jahanian F, Nazario J, Watson D (2005) The internet motion sensor: a distributed blackhole monitoring system. In: Proceedings of network and distributed system security symposium (NDSS)

    Google Scholar 

  2. Xu G, Yu W, Chen Z, Zhang H, Moulema P, Fu X, Lu C (2015) A cloud computing-based system for cyber security management. Int J Parallel Emergent Distrib Syst 30(1):29–45

    Article  Google Scholar 

  3. Yegneswaran V, Barford P, Jha S (2004) Global intrusion detection in the domino overlay system. In: Proceedings of the 11th IEEE network and distributed system security symposium (NDSS)

    Google Scholar 

  4. Yu W, Xu G, Chen Z, Moulema P (2013) A cloud computing-based architecture for cyber security situation awareness. In: Proceedings of 4th international workshop on security and privacy in cloud computing (SPCC)

    Google Scholar 

  5. Yu W, Zhang N, Fu X, Bettati R, Zhao W (2010) Location leakage of internet threat monitors: modeling and defense. IEEE Trans Comput (TC) 59(12):1655–1668

    Article  MATH  Google Scholar 

  6. Guo H, Li Y, Jajodi S (2007) Chaining watermarks for detecting malicious modifications to streaming data. Inf Sci 177(1):281–298

    Article  Google Scholar 

  7. Li X, Agrawal G (2005) Efficient evaluation of xquery over streaming data. In: Proceedings of the 31st international conference on very large data bases (VLDB)

    Google Scholar 

  8. Nehme RV, Rundensteiner EA, Bertino E (2008) A security punctuation framework for enforcing access control on streaming data. In: Proceedings of 24th international conference on data engineering (ICDE)

    Google Scholar 

  9. Zikopoulos P, Eaton C (2011) Understanding big data: analytics for enterprise class hadoop and streaming data

    Google Scholar 

  10. Guan Y, Fu X, Xuan D, Shenoy PU, Bettati R, Zhao W (2001) NetCamo: camouflaging network traffic for QoS-guaranteed mission critical applications. IEEE Trans Syst Man Cybern Part A: Syst Humans 31(4)

    Google Scholar 

  11. Eisenman SM, Fei X, Zhou X, Mahmassani HS (1964) Number and location of sensors for real-time network traffic estimation and prediction. Transp Res Rec J Transp Res Board 1:2006

    Google Scholar 

  12. Kim S, Reddy A (2005) A study of analyzing network traffic as images in real-time

    Google Scholar 

  13. Joshi MR, Hadi TH (2005) A review of network traffic analysis and prediction techniques. Computer Science

    Google Scholar 

  14. Khater N, Overill RE (2016) Network traffic classification techniques and challenges. In: Proceedings of 10th international conference on digital information management, pp 43–48

    Google Scholar 

  15. Ahrenholz J, Danilov C, Henderson T, Kim J (2008) CORE: a real-time network emulator

    Google Scholar 

  16. Dias K, Pongelupe M, Caminhas W, Errico L (2019) An innovative approach for real-time network traffic classification. Comput Netw 158:143–157

    Article  Google Scholar 

  17. Liu L, ** X, Min G, Xu L (2012) Real-time diagnosis of network anomaly based on statistical traffic analysis

    Google Scholar 

  18. Cejka T, Bartos V, Svepes M, Rosa Z, Kubatova H (2016) NEMEA: a framework for network traffic analysis

    Google Scholar 

  19. Goodall JR, Lutters WG, Rheingans P, Komlodi A (2006) Focusing on context in network traffic analysis. IEEE Comput Graphics Appl 26(2):72–80

    Article  Google Scholar 

  20. Karimi A, Niyaz Q, Sun W, Javaid A, Devabhaktuni V (2016) Distributed network traffic feature extraction for a real-time IDS. In: Proceedings of international conference on electro information technology, pp 522–526

    Google Scholar 

  21. Sullivan M, Heybey A (2021) Tribeca: a system for managing large databases of network Traac

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Amit Saraswat .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2024 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Gupta, Y., Saraswat, A., Goyal, S.K. (2024). Real-Time Network Traffic Analysis for Threat Detection. In: Goyal, S.K., Palwalia, D.K., Tiwari, R., Gupta, Y. (eds) Flexible Electronics for Electric Vehicles. FLEXEV 2022. Lecture Notes in Electrical Engineering, vol 1065. Springer, Singapore. https://doi.org/10.1007/978-981-99-4795-9_36

Download citation

  • DOI: https://doi.org/10.1007/978-981-99-4795-9_36

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-99-4794-2

  • Online ISBN: 978-981-99-4795-9

  • eBook Packages: EnergyEnergy (R0)

Publish with us

Policies and ethics

Navigation