Results 101 to 110 of about 6,155,073 (227)
In response to the difficulty of existing attack detection methods in dealing with advanced persistent threat (APT) with longer durations, complex and covert attack methods, a model for APT attack detection based on attention mechanisms and provenance ...
Yuancheng LI +3 more
doaj +2 more sources
Multi-type low-rate DDoS attack detection method based on hybrid deep learning
Low-Rate distributed denial of service (DDoS) attack attacks the vulnerabilities in the adaptive mechanism of network protocols, posing a huge threat to the quality of network services.Low-Rate DDoS attack was characterized by high secrecy, low attack ...
Lijuan LI +3 more
doaj
Attack detection model for BCoT based on contrastive variational autoencoder and metric learning
With development of blockchain technology, clouding computing and Internet of Things (IoT), blockchain and cloud of things (BCoT) has become development tendency. But the security has become the most development hinder of BCoT.
Chunwang Wu +6 more
doaj +1 more source
Attack as Detection: Using Adversarial Attack Methods to Detect Abnormal Examples
As a new programming paradigm, deep learning (DL) has achieved impressive performance in areas such as image processing and speech recognition, and has expanded its application to solve many real-world problems. However, neural networks and DL are normally black-box systems; even worse, DL-based software are vulnerable to threats from ...
Zhe Zhao +6 more
openaire +2 more sources
Research on low-rate DDoS attack of SDN network in cloud environment
Aiming at the problems of low-rate DDoS attack detection accuracy in cloud SDN network and the lack of unified framework for data plane and control plane low-rate DDoS attack detection and defense,a unified framework for low-rate DDoS attack detection ...
Xingshu CHEN +4 more
doaj +2 more sources
Image preprocessing models are usually employed as the preceding operations of high‐level vision tasks to improve the performance. The adversarial attack technology makes both these models face severe challenges.
Xueshuai Gao +6 more
doaj +1 more source
IDSGAN: Generative Adversarial Networks for Attack Generation against Intrusion Detection
As an important tool in security, the intrusion detection system bears the responsibility of the defense to network attacks performed by malicious traffic.
Lin, Zilong, Shi, Yong, Xue, Zhi
core
The expansion of operation technology (OT) use and its tight integration with classical information and communication technologies have led not only to additional and improved possibilities in monitoring physical/manufacturing processes and the emergency
Nikolaj Goranin +2 more
doaj +1 more source
Phasor measurement unit (PMU) plays a crucial role in smart grids, enabling precise synchronized acquisition of electric power data. Due to the use of the global positioning system (GPS) for time synchronization, the PMU is vulnerable to GPS spoofing ...
Hui WU +5 more
doaj +1 more source
With the increasing proliferation of the Internet of Things (IoT) and the rise of cyber‐attacks targeting these devices, the need for efficient attack detection methods has become increasingly urgent.
Reza Tavoli +2 more
doaj +1 more source

