Results 31 to 40 of about 1,097,826 (233)

Detection of Malicious Network Flows with Low Preprocessing Overhead

open access: yesNetwork, 2022
Machine learning (ML) is frequently used to identify malicious traffic flows on a network. However, the requirement of complex preprocessing of network data to extract features or attributes of interest before applying the ML models restricts their use ...
Garett Fox, Rajendra V. Boppana
doaj   +1 more source

Feature analysis of encrypted malicious traffic

open access: yesExpert Systems with Applications, 2019
In recent years there has been a dramatic increase in the number of malware attacks that use encrypted HTTP traffic for self-propagation or communication. Antivirus software and firewalls typically will not have access to encryption keys, and therefore direct detection of malicious encrypted data is unlikely to succeed. However, previous work has shown
Shekhawat, Anish Singh   +2 more
openaire   +2 more sources

Point Cloud Analysis for ML-Based Malicious Traffic Detection: Reducing Majorities of False Positive Alarms

open access: yesConference on Computer and Communications Security, 2023
As an emerging security paradigm, machine learning (ML) based malicious traffic detection is an essential part of automatic defense against network attacks.
Chuanpu Fu, Qi Li, Ke Xu, Jianping Wu
semanticscholar   +1 more source

Spatial-Temporal Feature with Dual-Attention Mechanism for Encrypted Malicious Traffic Detection

open access: yesSecurity and Communication Networks, 2023
While encryption ensures the confidentiality and integrity of user data, more and more attackers try to hide attack behaviours through encryption, which brings new challenges to malicious traffic identification.
Jianyi Liu   +6 more
semanticscholar   +1 more source

Realtime Malicious Traffic Detection Targeted for TCP Out-of-Order Packets Based on FPGA

open access: yesIEEE Access, 2023
Currently, with the increasing popularity of high-speed network, in order to protect the network environment, more and more companies start to explore how to efficiently detect malicious traffic.
Zhenguo Hu   +3 more
doaj   +1 more source

Encrypted Malicious Traffic Identification Based on Hierarchical Spatiotemporal Feature and Multi-Head Attention [PDF]

open access: yesJisuanji gongcheng, 2021
To implement the full encryption of Internet,the accurate detection of encrypted malicious traffic is required,but traditional detection methods rely heavily on expert experience and perform poorly in distiguishment of encrypted traffic feature is not ...
JIANG Tongtong, YIN Weixin, CAI Bing, ZHANG Kun
doaj   +1 more source

Tor Multipath Selection Based on Threaten Awareness [PDF]

open access: yesJisuanji kexue
With the development and application of machine learning and deep learning,attackers can conduct traffic analysis on malicious nodes and malicious AS on Tor user links,thus carrying out de-anonymization attacks on Tor users.At present,one of the common ...
CHEN Shangyu, HU Hongchao, ZHANG Shuai, ZHOU Dacheng, YANG Xiaohan
doaj   +3 more sources

CTTGAN: Traffic Data Synthesizing Scheme Based on Conditional GAN

open access: yesSensors, 2022
Most machine learning algorithms only have a good recognition rate on balanced datasets. However, in the field of malicious traffic identification, benign traffic on the network is far greater than malicious traffic, and the network traffic dataset is ...
Jiayu Wang   +4 more
doaj   +1 more source

Malicious Traffic Detection Using K-means

open access: yesThe Journal of Korean Institute of Communications and Information Sciences, 2016
Various network attacks such as DDoS(Distributed Denial of service) and orm are one of the biggest problems in the modern society. These attacks reduce the quality of internet service and caused the cyber crime. To solve the above problem, signature based IDS(Intrusion Detection System) has been developed by network vendors.
Dong Hyuk Shin   +3 more
openaire   +2 more sources

Research on Network Malicious Traffic Detection for Post-Exploitation Attack Behavior [PDF]

open access: yesJisuanji gongcheng
Existing post-exploitation behavior studies mainly focus on the host side of the attack and defense countermeasures, and lack pattern analysis and detection methods for the traffic side.
LIANG Songlin, LIN Wei, WANG Jue, YANG Qing
doaj   +1 more source

Home - About - Disclaimer - Privacy