A Survey on Network Security-Related Data Collection Technologies

Huaqing Lin, Zheng Yan, Yu Chen, Lifang Zhang

    Research output: Contribution to journalReview Articlepeer-review

    71 Citations (Scopus)
    314 Downloads (Pure)

    Abstract

    Security threats and economic loss caused by network attacks, intrusions and vulnerabilities have motivated intensive studies on network security. Normally, data collected in a network system can reflect or can be used to detect security threats. We define these data as network security-related data. Studying and analyzing security-related data can help detect network attacks and intrusions, thus making it possible to further measure the security level of the whole network system. Obviously, the first step in detecting network attacks and intrusions is to collect security-related data. However, in the context of big data and 5G, there exist a number of challenges in collecting these security-related data. In this paper, we first briefly introduce network security-related data, including its definition and characteristics, and the applications of network data collection. We then provide the requirements and objectives for security-related data collection and present a taxonomy of data collection technologies. Moreover, we review existing collection nodes, collection tools and collection mechanisms in terms of network data collection and analyze them based on the proposed requirements and objectives towards high quality security-related data collection. Finally, we discuss open research issues and conclude with suggestions for future research directions.

    Original languageEnglish
    Pages (from-to)18345-18365
    Number of pages21
    JournalIEEE Access
    Volume6
    Issue number1
    DOIs
    Publication statusPublished - 2018
    MoE publication typeA2 Review article, Literature review, Systematic review

    Keywords

    • Communication networks
    • Data collection
    • data collection technologies
    • Intrusion detection
    • large-scale heterogeneous networks
    • Malware
    • Monitoring
    • network security
    • security-related data
    • Telecommunication traffic

    Fingerprint

    Dive into the research topics of 'A Survey on Network Security-Related Data Collection Technologies'. Together they form a unique fingerprint.

    Cite this