Results 171 to 180 of about 1,097,826 (233)
Some of the next articles are maybe not open access.
GSA-DT: A Malicious Traffic Detection Model Based on Graph Self-Attention Network and Decision Tree
IEEE Transactions on Network and Service ManagementMalicious attack has shown a rapid growth in recent years, it is very important to accurately detect malicious traffic to defend against malicious attacks. Compared with machine learning and deep learning technologies, graph convolutional neural network (
Saihua Cai +5 more
semanticscholar +1 more source
IEEE Internet of Things Journal
The purpose of malicious traffic detection and identification in the Internet of Things (IoT) is to detect the intrusion of malicious traffic within the IoT network into IoT devices.
Shizhou Zhu +3 more
semanticscholar +1 more source
The purpose of malicious traffic detection and identification in the Internet of Things (IoT) is to detect the intrusion of malicious traffic within the IoT network into IoT devices.
Shizhou Zhu +3 more
semanticscholar +1 more source
IEEE Transactions on Network and Service Management
Encrypting network traffic is an effective means of safeguarding user privacy and sensitive information. However, it also introduces potential vulnerabilities that can be exploited by network attackers, posing significant security risks to the Internet ...
Jin Yang +5 more
semanticscholar +1 more source
Encrypting network traffic is an effective means of safeguarding user privacy and sensitive information. However, it also introduces potential vulnerabilities that can be exploited by network attackers, posing significant security risks to the Internet ...
Jin Yang +5 more
semanticscholar +1 more source
IEEE Transactions on Information Forensics and Security
Due to the limitations of the existing annotation methods, the prevalence of label noise can be caused in realistic malicious traffic datasets, which has a significant impact on the training and evaluation of deep learning-based intrusion detection ...
Qing-jun Yuan +5 more
semanticscholar +1 more source
Due to the limitations of the existing annotation methods, the prevalence of label noise can be caused in realistic malicious traffic datasets, which has a significant impact on the training and evaluation of deep learning-based intrusion detection ...
Qing-jun Yuan +5 more
semanticscholar +1 more source
China Communications, 2023
In the upcoming large-scale Internet of Things (IoT), it is increasingly challenging to defend against malicious traffic, due to the heterogeneity of IoT devices and the diversity of IoT communication protocols.
Yantian Luo +5 more
semanticscholar +1 more source
In the upcoming large-scale Internet of Things (IoT), it is increasingly challenging to defend against malicious traffic, due to the heterogeneity of IoT devices and the diversity of IoT communication protocols.
Yantian Luo +5 more
semanticscholar +1 more source
Characterization and classification of malicious Web traffic
Computers & Security, 2014Abstract Web systems commonly face unique set of vulnerabilities and security threats due to their high exposure, access by browsers, and integration with databases. This study is focused on characterization and classification of malicious cyber activities aimed at Web systems.
Katerina Goseva-Popstojanova +4 more
openaire +1 more source
Flow Interaction Graph Analysis: Unknown Encrypted Malicious Traffic Detection
IEEE/ACM Transactions on NetworkingNowadays traffic on the Internet has been widely encrypted to protect its confidentiality and privacy. However, traffic encryption is always abused by attackers to conceal their malicious behaviors.
Chuanpu Fu, Qi Li, Ke Xu
semanticscholar +1 more source
Identifying malicious botnet traffic using logistic regression
2018 Systems and Information Engineering Design Symposium (SIEDS), 2018An important source of cyber-attacks is malware, which proliferates in different forms such as botnets. The botnet malware typically looks for vulnerable devices across the Internet, rather than targeting specific individuals, companies or industries. It attempts to infect as many connected devices as possible, using their resources for automated tasks
Rohan Bapat +6 more
openaire +1 more source
Robust Detection of Malicious Encrypted Traffic via Contrastive Learning
IEEE Transactions on Information Forensics and SecurityTraffic encryption is widely used to protect communication privacy but is increasingly exploited by attackers to conceal malicious activities. Existing malicious encrypted traffic detection methods rely on large amounts of labeled samples for training ...
Meng Shen +5 more
semanticscholar +1 more source
LightGuard: A Lightweight Malicious Traffic Detection Method for Internet of Things
IEEE Internet of Things JournalThe rapid growth of Internet of Things (IoT) devices has expanded the cyber attack surface, posing a challenge to IoT security. Some deep-learning-based detection methods have been designed to detect malicious attacks in the IoT by analyzing network ...
Yuehua Huo +4 more
semanticscholar +1 more source

