Skip to main content
Advertisement
Browse Subject Areas
?

Click through the PLOS taxonomy to find articles in your field.

For more information about PLOS Subject Areas, click here.

< Back to Article

Fig 1.

Next-generation network architecture.

More »

Fig 1 Expand

Fig 2.

Flow monitoring in next-generation network architecture.

More »

Fig 2 Expand

Fig 3.

Architecture of two-stage flow-based intrusion detection system.

More »

Fig 3 Expand

Fig 4.

Malicious flow collection process.

More »

Fig 4 Expand

Fig 5.

Training of one-class SVM using malicious flow.

More »

Fig 5 Expand

Table 1.

Detailed attributes for Netflow v5 flow records.

More »

Table 1 Expand

Table 2.

Detailed flows in Sperotto’s dataset.

More »

Table 2 Expand

Table 3.

Test and training dataset—Sperotto dataset.

More »

Table 3 Expand

Table 4.

Test and training dataset—Malware and APT dataset.

More »

Table 4 Expand

Table 5.

Detail of flow records—SIP dataset.

More »

Table 5 Expand

Table 6.

Test and training dataset—SIP dataset.

More »

Table 6 Expand

Table 7.

Confusion matrix for outlier detection during one-class SVM training—Sperotto’s dataset.

More »

Table 7 Expand

Table 8.

Clustering malicious flows in second stage process—Sperotto’s dataset.

More »

Table 8 Expand

Fig 6.

SOM clustering results comparison—Sperotto’s dataset.

More »

Fig 6 Expand

Table 9.

Confusion matrix for outlier detection during one-class SVM training—Malware and APT dataset.

More »

Table 9 Expand

Table 10.

SOM clustering results—Malware and APT dataset.

More »

Table 10 Expand

Fig 7.

Malware and APT clustering results comparison.

More »

Fig 7 Expand

Table 11.

Confusion matrix for outlier detection during one-class SVM training—SIP dataset.

More »

Table 11 Expand

Table 12.

SOM clustering results—SIP dataset.

More »

Table 12 Expand

Fig 8.

SOM clustering results comparison—SIP dataset.

More »

Fig 8 Expand