Results 21 to 30 of about 1,097,826 (233)

Blacklist-based malicious IP traffic detection [PDF]

open access: yes2015 Global Conference on Communication Technologies (GCCT), 2015
At present malicious software or malware has increased considerably to form a serious threat to Internet infrastructure. It becomes the major source of most malicious activities on the Internet such as direct attacks, (distributed) denial-of-service (DOS) activities and scanning.
Ghafir Ibrahim, Přenosil Václav
openaire   +1 more source

A deep‐learning‐ and reinforcement‐learning‐based system for encrypted network malicious traffic detection

open access: yesElectronics Letters, 2021
Traditional network intrusion detection methods lack the ability of automatic feature extraction for encrypted network malicious traffic, and thus, the detection rates are low.
Jin Yang   +4 more
doaj   +1 more source

Malicious Encryption Traffic Detection Based on NLP [PDF]

open access: yesSecurity and Communication Networks, 2021
The development of Internet and network applications has brought the development of encrypted communication technology. But on this basis, malicious traffic also uses encryption to avoid traditional security protection and detection. Traditional security protection and detection methods cannot accurately detect encrypted malicious traffic.
Hao Yang   +3 more
openaire   +1 more source

Malicious DNS traffic detection based neural networks

open access: yesTongxin xuebao
To solve the problems of low detection accuracy and speed caused by low efficiency in extracting traffic features using machine learning to detect malicious DNS traffic, a malicious DNS traffic detection method FDS-DL was proposed, which combines ...
SHAN Kangkang   +3 more
doaj   +1 more source

Malicious Encrypted Traffic Detection Integrating One-Dimensional Inception Structure and ViT [PDF]

open access: yesJisuanji gongcheng, 2023
In Internet encryption, traditional malicious traffic detection performs poorly in distinguishing encrypted traffic.To detect malicious traffic in encrypted traffic better, this paper designs a malicious encryption traffic detection model integrating a ...
SUN Yi, GAO Jian, GU Yijun
doaj   +1 more source

Construction of DDoS attacks malicious behavior knowledge base construction

open access: yesDianxin kexue, 2021
Aiming at the problem of insufficient research on the knowledge base of distributed denial of service (DDoS) network attacks, a method for constructing a knowledge base of DDoS attacks malicious behavior was proposed.The knowledge base was constructed ...
Feiyang LIU   +3 more
doaj   +2 more sources

Improved malicious node detection method for detecting a bait in an extensive network for getting the maximum throughput

open access: yesIET Communications, EarlyView., 2022
Abstract Mobile Ad‐hoc Network (MANET) is an ad hoc Wireless subset with a unique dynamic geometry of the system and movable nodes. The MANETs are auto‐organized networks that permit mobility without infrastructure. Specific protocols for MANET routing are provided with these attributes.
Shalini Goel   +5 more
wiley   +1 more source

Web Application Firewall Reinforcement Scheme Based on Recurrent Neural Network [PDF]

open access: yesJisuanji gongcheng, 2022
Web Application Firewall(WAF) detects and filters HTTP traffic to and from a Web application via a set of rules.Owing to the complexity of malicious traffic, WAF rules must be constantly updated to defend against latest or advanced attacks.However ...
ZHU Simeng, DU Ruiying, CHEN Jing, HE Kun
doaj   +1 more source

Machine learning for encrypted malicious traffic detection: Approaches, datasets and comparative study [PDF]

open access: yesComputers & security, 2021
As people’s demand for personal privacy and data security becomes a priority, encrypted traffic has become mainstream in the cyber world. However, traffic encryption is also shielding malicious and illegal traffic introduced by adversaries, from being ...
Zihao Wang, Fok Kar Wai, V. Thing
semanticscholar   +1 more source

Towards Fingerprinting Malicious Traffic

open access: yesProcedia Computer Science, 2013
AbstractThe primary intent of this paper is detect malicious traffic at the network level. To this end, we apply several machine learning techniques to build classifiers that fingerprint maliciousness on IP traffic. As such, J48, Näıve Bayesian, SVM and Boosting algorithms are used to classify malware communications that are generated from dynamic ...
Boukhtouta, Amine   +3 more
openaire   +1 more source

Home - About - Disclaimer - Privacy