A dataset collected in real-world industrial control systems for network attack detection. [PDF]
Zhou X +9 more
europepmc +1 more source
Optimized CatBoost machine learning (OCML) for DDoS detection in cloud virtual machines with time-series and adversarial robustness. [PDF]
Samy H, Bahaa-Eldin AM, Sobh MA, Taha A.
europepmc +1 more source
LSTM guided homomorphic encryption for threat-resistant IoT networks. [PDF]
Kumar S +5 more
europepmc +1 more source
Combination of quantum-based optimizer and feature pyramid network for intrusion detection in Cloud-IoT environments. [PDF]
Hajlaoui R +3 more
europepmc +1 more source
Explainable attention based few shot LSTM for intrusion detection in imbalanced cyber physical system networks. [PDF]
Abdulganiyu OH +6 more
europepmc +1 more source
Malicious traffic detection in encrypted network (本文)
openaire
Malicious traffic detection in encrypted network (要旨)
openaire
Related searches:
A Survey of Encrypted Malicious Traffic Detection
2021 International Conference on Communications, Computing, Cybersecurity, and Informatics (CCCI), 2021With more and more encrypted traffic such as HTTPS, encrypted traffic protects not only normal traffic, but also malicious traffic. Identification of encrypted malicious traffic without decryption has become a research hotspot. Combined with deep learning, an important branch of machine learning, encrypted malicious traffic detection has achieved good ...
Yanmiao Li +5 more
openaire +1 more source
Balancing the Detection of Malicious Traffic in SDN Context
2021 Twelfth International Conference on Ubiquitous and Future Networks (ICUFN), 2021Huge efforts and resources are spent every year on prevention and recovery of cyberattacks targeting users, services and network infrastructures. Software-Defined Networking (SDN) is a technology providing advances to the field of security with the ability of programming the network, promoting highperformance solutions and efficient resource ...
Machado, Bruno Salgado +3 more
openaire +2 more sources
DNS traffic analysis for malicious domains detection
2015 2nd International Conference on Signal Processing and Integrated Networks (SPIN), 2015The web has become the medium of choice for people to search for information, conduct business, and enjoy entertainment. At the same time, the web has also become the primary platform used by miscreants to attack users. For example, drive-by-download attacks, which could be through malicious domains, are a popular choice among bot herders to grow their
Ibrahim Ghafir, Vaclav Prenosil
openaire +1 more source

