TCN enhanced novel malicious traffic detection for IoT devices
Published in Connection Science, 2022
Liu Xin, Liu Ziang, Zhang Yingli, Zhang Wenqiang, Lv Dong, Zhou Qingguo
The network traffic passing through the node can be copied and forwarded by a bypass in a network node. The data capture module copies the data from the network card to the memory and temporarily stores them for subsequent processing. At present, more general traffic monitoring and capture software is implemented based on the Pcap APIs, such as Wireshark, Nmap, ntop, TCPDUMP, and WinDUMP, and intrusion detection system snort. Pcap APIs use Libpcap (Garcia, 2008; McCanne, 2011) under Linux and WinPcap (Risso & Degioanni, 2001) under Windows. The traffic captured in this method will be copied to memory with Pcap encapsulation format, including capture time, data size, and other information.