A Survey on Network Security-Related Data Collection Technologies

Huaqing Lin, Zheng Yan, Yu Chen, Lifang Zhang

Research output: Contribution to journalReview ArticleScientificpeer-review

38 Citations (Scopus)
215 Downloads (Pure)


Security threats and economic loss caused by network attacks, intrusions and vulnerabilities have motivated intensive studies on network security. Normally, data collected in a network system can reflect or can be used to detect security threats. We define these data as network security-related data. Studying and analyzing security-related data can help detect network attacks and intrusions, thus making it possible to further measure the security level of the whole network system. Obviously, the first step in detecting network attacks and intrusions is to collect security-related data. However, in the context of big data and 5G, there exist a number of challenges in collecting these security-related data. In this paper, we first briefly introduce network security-related data, including its definition and characteristics, and the applications of network data collection. We then provide the requirements and objectives for security-related data collection and present a taxonomy of data collection technologies. Moreover, we review existing collection nodes, collection tools and collection mechanisms in terms of network data collection and analyze them based on the proposed requirements and objectives towards high quality security-related data collection. Finally, we discuss open research issues and conclude with suggestions for future research directions.

Original languageEnglish
Pages (from-to)18345-18365
Number of pages21
JournalIEEE Access
Issue number1
Publication statusPublished - 2018
MoE publication typeA2 Review article in a scientific journal


  • Communication networks
  • Data collection
  • data collection technologies
  • Intrusion detection
  • large-scale heterogeneous networks
  • Malware
  • Monitoring
  • network security
  • security-related data
  • Telecommunication traffic


Dive into the research topics of 'A Survey on Network Security-Related Data Collection Technologies'. Together they form a unique fingerprint.

Cite this