Results 41 to 50 of about 1,097,826 (233)

Real-Time Malicious Traffic Detection With Online Isolation Forest Over SD-WAN

open access: yesIEEE Transactions on Information Forensics and Security, 2023
Software Defined Network (SDN) has been widely used in modern network architecture. The SD-WAN is considered as a technology that has a potential to revolutionize the WAN service usage by utilizing the SDN philosophy. Attacks within SD-WAN can affect the
Pei Zhang   +8 more
semanticscholar   +1 more source

A Credibility Score Algorithm for Malicious Data Detection in Urban Vehicular Networks

open access: yesInformation, 2020
This paper introduces a method to detect malicious data in urban vehicular networks, where vehicles report their locations to road-side units controlling traffic signals at intersections.
Bartłomiej Płaczek   +2 more
doaj   +1 more source

A Payload Based Malicious HTTP Traffic Detection Method Using Transfer Semi-Supervised Learning

open access: yesApplied Sciences, 2021
Malicious HTTP traffic detection plays an important role in web application security. Most existing work applies machine learning and deep learning techniques to build the malicious HTTP traffic detection model.
Tieming Chen   +6 more
doaj   +1 more source

Optimal Source-Based Filtering of Malicious Traffic [PDF]

open access: yesIEEE/ACM Transactions on Networking, 2012
In this paper, we consider the problem of blocking malicious traffic on the Internet, via source-based filtering. In particular, we consider filtering via access control lists (ACLs): these are already available at the routers today but are a scarce resource because they are stored in the expensive ternary content addressable memory (TCAM). Aggregation
Soldo, Fabio   +2 more
openaire   +2 more sources

Accurate Encrypted Malicious Traffic Identification via Traffic Interaction Pattern Using Graph Convolutional Network

open access: yesApplied Sciences, 2023
Telecommuting and telelearning have gradually become mainstream lifestyles in the post-epidemic era. The extensive interconnection of massive terminals gives attackers more opportunities, which brings more significant challenges to network traffic ...
Guoqiang Ren, Guang Cheng, Nan Fu
semanticscholar   +1 more source

Study on SSL/TLS Encrypted Malicious Traffic Detection Algorithm Based on Graph Neural Networks [PDF]

open access: yesJisuanji kexue
In order to achieve precise detection of SSL/TLS encrypted malicious traffic,a graph neural network-based model for malicious encrypted traffic detection is proposed,to address the issue of excessive reliance on expert experience in traditional machine ...
TANG Ying, WANG Baohui
doaj   +1 more source

Network Traffic Analysis To Classify Malicious And Non-Malicious Traffic

open access: yesInternational Research Journal on Advanced Engineering Hub (IRJAEH)
In the face of increasingly sophisticated cyber threats, ensuring network security is crucial for organizations aiming to protect sensitive data, maintain service continuity, and avoid financial losses. Effective network traffic monitoring is essential for identifying malicious activities that can compromise network integrity.
null Thanushiya.S   +3 more
openaire   +1 more source

Replay of malicious traffic in network testbeds [PDF]

open access: yes2013 IEEE International Conference on Technologies for Homeland Security (HST), 2013
In this paper we present tools and methods to integrate attack measurements from the Internet with controlled experimentation on a network testbed. We show that this approach provides greater fidelity than synthetic models. We compare the statistical properties of real-world attacks with synthetically generated constant bit rate attacks on the testbed.
Alefiya Hussain   +2 more
openaire   +1 more source

Why Autonomous Vehicles Are Not Ready Yet: A Multi‐Disciplinary Review of Problems, Attempted Solutions, and Future Directions

open access: yesJournal of Field Robotics, EarlyView.
ABSTRACT Personal autonomous vehicles can sense their surrounding environment, plan their route, and drive with little or no involvement of human drivers. Despite the latest technological advancements and the hopeful announcements made by leading entrepreneurs, to date no personal vehicle is approved for road circulation in a “fully” or “semi ...
Xingshuai Dong   +13 more
wiley   +1 more source

Adaptive Clustering-based Malicious Traffic Classification at the Network Edge

open access: yesIEEE Conference on Computer Communications, 2021
The rapid uptake of digital services and Internet of Things (IoT) technology gives rise to unprecedented numbers and diversification of cyber attacks, with which commonly-used rule-based Network Intrusion Detection Systems (NIDSs) are struggling to cope.
A. Diallo, P. Patras
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy