Results 21 to 30 of about 1,097,826 (233)
Blacklist-based malicious IP traffic detection [PDF]
At present malicious software or malware has increased considerably to form a serious threat to Internet infrastructure. It becomes the major source of most malicious activities on the Internet such as direct attacks, (distributed) denial-of-service (DOS) activities and scanning.
Ghafir Ibrahim, Přenosil Václav
openaire +1 more source
Traditional network intrusion detection methods lack the ability of automatic feature extraction for encrypted network malicious traffic, and thus, the detection rates are low.
Jin Yang +4 more
doaj +1 more source
Malicious Encryption Traffic Detection Based on NLP [PDF]
The development of Internet and network applications has brought the development of encrypted communication technology. But on this basis, malicious traffic also uses encryption to avoid traditional security protection and detection. Traditional security protection and detection methods cannot accurately detect encrypted malicious traffic.
Hao Yang +3 more
openaire +1 more source
Malicious DNS traffic detection based neural networks
To solve the problems of low detection accuracy and speed caused by low efficiency in extracting traffic features using machine learning to detect malicious DNS traffic, a malicious DNS traffic detection method FDS-DL was proposed, which combines ...
SHAN Kangkang +3 more
doaj +1 more source
Malicious Encrypted Traffic Detection Integrating One-Dimensional Inception Structure and ViT [PDF]
In Internet encryption, traditional malicious traffic detection performs poorly in distinguishing encrypted traffic.To detect malicious traffic in encrypted traffic better, this paper designs a malicious encryption traffic detection model integrating a ...
SUN Yi, GAO Jian, GU Yijun
doaj +1 more source
Construction of DDoS attacks malicious behavior knowledge base construction
Aiming at the problem of insufficient research on the knowledge base of distributed denial of service (DDoS) network attacks, a method for constructing a knowledge base of DDoS attacks malicious behavior was proposed.The knowledge base was constructed ...
Feiyang LIU +3 more
doaj +2 more sources
Abstract Mobile Ad‐hoc Network (MANET) is an ad hoc Wireless subset with a unique dynamic geometry of the system and movable nodes. The MANETs are auto‐organized networks that permit mobility without infrastructure. Specific protocols for MANET routing are provided with these attributes.
Shalini Goel +5 more
wiley +1 more source
Web Application Firewall Reinforcement Scheme Based on Recurrent Neural Network [PDF]
Web Application Firewall(WAF) detects and filters HTTP traffic to and from a Web application via a set of rules.Owing to the complexity of malicious traffic, WAF rules must be constantly updated to defend against latest or advanced attacks.However ...
ZHU Simeng, DU Ruiying, CHEN Jing, HE Kun
doaj +1 more source
Machine learning for encrypted malicious traffic detection: Approaches, datasets and comparative study [PDF]
As people’s demand for personal privacy and data security becomes a priority, encrypted traffic has become mainstream in the cyber world. However, traffic encryption is also shielding malicious and illegal traffic introduced by adversaries, from being ...
Zihao Wang, Fok Kar Wai, V. Thing
semanticscholar +1 more source
Towards Fingerprinting Malicious Traffic
AbstractThe primary intent of this paper is detect malicious traffic at the network level. To this end, we apply several machine learning techniques to build classifiers that fingerprint maliciousness on IP traffic. As such, J48, Näıve Bayesian, SVM and Boosting algorithms are used to classify malware communications that are generated from dynamic ...
Boukhtouta, Amine +3 more
openaire +1 more source

