Yasemin Gokcen

Learn More
It is shown in the literature that network address translation devices have become a convenient way to hide the source of malicious behaviors. In this research, we explore how far we can push a machine learning (ML) approach to identify such behaviors using only network flows. We evaluate our proposed approach on different traffic data sets against passive(More)
In this paper, we propose a system for automatically optimizing a decision support system to assist IT helpdesk operators for IT management tasks. The proposed system aims to leverage the publicly available experience that can be accessed on the Internet (such as blogs, discussion list etc.) in order to manage problems in IT environments. To achieve this,(More)
Identification of P2P (peer to peer) applications inside network traffic plays an important role for route provisioning, traffic policing, flow prioritization, network service pricing, network capacity planning and network resource management. Inspecting and identifying the P2P applications is one of the most important tasks to have a network that runs(More)
  • 1