Results 161 to 170 of about 1,097,826 (233)
Some of the next articles are maybe not open access.
Related searches:
Related searches:
Correlation based malicious traffic analysis system
International Journal of Knowledge-based and Intelligent Engineering Systems, 2021Artificial intelligence methods have often been applied to carry out specific functions or errands in the cyber-defense realm. However, as adversary methods become more complex and difficult to divine, piecemeal efforts to understand cyber-attacks, and malware-based attacks in particular, are not providing sufficient means for malware analysts to ...
Arivudainambi, D. +2 more
openaire +1 more source
Frequency Domain Feature Based Robust Malicious Traffic Detection
IEEE/ACM Transactions on Networking, 2023Machine learning (ML) based malicious traffic detection is an emerging security paradigm, particularly for zero-day attack detection, which is complementary to existing rule based detection. However, the existing ML based detection achieves low detection
Chuanpu Fu, Qi Li, Meng Shen, Ke Xu
semanticscholar +1 more source
International Symposium on Recent Advances in Intrusion Detection, 2023
Malicious traffic classification is crucial for Intrusion Detection Systems (IDS). However, traditional Machine Learning approaches necessitate expert knowledge and a significant amount of well-labeled data.
Zijun Hang +3 more
semanticscholar +1 more source
Malicious traffic classification is crucial for Intrusion Detection Systems (IDS). However, traditional Machine Learning approaches necessitate expert knowledge and a significant amount of well-labeled data.
Zijun Hang +3 more
semanticscholar +1 more source
IEEE Transactions on Smart Grid, 2023
Malicious traffic attack can prolong the transmission delay of normal data flows by exhausting the limited bandwidth with injecting numerous invalid data packets.
Yajian Zhang +3 more
semanticscholar +1 more source
Malicious traffic attack can prolong the transmission delay of normal data flows by exhausting the limited bandwidth with injecting numerous invalid data packets.
Yajian Zhang +3 more
semanticscholar +1 more source
ACM Transactions on Privacy and Security, 2023
In recent years, the use of TLS (Transport Layer Security) protocol to protect communication information has become increasingly popular as users are more aware of network security.
Jinfu Chen +5 more
semanticscholar +1 more source
In recent years, the use of TLS (Transport Layer Security) protocol to protect communication information has become increasingly popular as users are more aware of network security.
Jinfu Chen +5 more
semanticscholar +1 more source
A Survey of Encrypted Malicious Traffic Detection
2021 International Conference on Communications, Computing, Cybersecurity, and Informatics (CCCI), 2021With more and more encrypted traffic such as HTTPS, encrypted traffic protects not only normal traffic, but also malicious traffic. Identification of encrypted malicious traffic without decryption has become a research hotspot. Combined with deep learning, an important branch of machine learning, encrypted malicious traffic detection has achieved good ...
Yanmiao Li +5 more
openaire +1 more source
Clustering analysis for malicious network traffic
2017 IEEE International Conference on Communications (ICC), 2017With the volume and variety of network attacks increasing, efficient approaches to detect and stop network attacks before they damage the system or steal data is paramount to users and network administrators. Although many different detection mechanisms have been proposed, exiting detection methods generally tend to successfully detect attacks only ...
Jie Wang +3 more
openaire +1 more source
Input and Output Matter: Malicious Traffic Detection With Explainability
IEEE NetworkDeep learning-based models demonstrate a remarkable level of accuracy in network traffic identification. However, the black-box nature of neural networks often makes the identification results difficult to explain.
Wanshuang Lin +5 more
semanticscholar +1 more source

