Realtime Malicious Traffic Detection Targeted for TCP Out-of-Order Packets Based on FPGA
Currently, with the increasing popularity of high-speed network, in order to protect the network environment, more and more companies start to explore how to efficiently detect malicious traffic.
Zhenguo Hu +3 more
doaj +1 more source
Research on Malicious Encrypted Traffic Annotation Method for Android Mobile Application [PDF]
In order to distinguish malicious traffic generated by running malicious Android applications from normal traffic,this paper proposes a method for annotating malicious traffic of mobile Android applications.For encrypted network traffic,encryption ...
HE Gaofeng, SI Yongrui, XU Bingfeng
doaj +1 more source
A Payload Based Malicious HTTP Traffic Detection Method Using Transfer Semi-Supervised Learning
Malicious HTTP traffic detection plays an important role in web application security. Most existing work applies machine learning and deep learning techniques to build the malicious HTTP traffic detection model.
Tieming Chen +6 more
doaj +1 more source
Abstract Mobile Ad‐hoc Network (MANET) is an ad hoc Wireless subset with a unique dynamic geometry of the system and movable nodes. The MANETs are auto‐organized networks that permit mobility without infrastructure. Specific protocols for MANET routing are provided with these attributes.
Shalini Goel +5 more
wiley +1 more source
Malicious Traffic Detection Using K-means
Various network attacks such as DDoS(Distributed Denial of service) and orm are one of the biggest problems in the modern society. These attacks reduce the quality of internet service and caused the cyber crime. To solve the above problem, signature based IDS(Intrusion Detection System) has been developed by network vendors.
Dong Hyuk Shin +3 more
openaire +2 more sources
Research on Network Malicious Traffic Detection for Post-Exploitation Attack Behavior [PDF]
Existing post-exploitation behavior studies mainly focus on the host side of the attack and defense countermeasures, and lack pattern analysis and detection methods for the traffic side.
LIANG Songlin, LIN Wei, WANG Jue, YANG Qing
doaj +1 more source
Research on Malicious Mobile Application Detection Based on Domain Name Association [PDF]
In order to realize the accurate detection of malicious mobile applications and ensure the security of mobile devices,a malicious mobile application detection method based on DNS is proposed.DNS domain name is used as the analysis object of detection to ...
CAI Rongyan, WANG He, YAO Qigui, HE Gaofeng
doaj +1 more source
A Taxonomy of Malicious Traffic for Intrusion Detection Systems [PDF]
4 Pages, 2 Figures, Accepted in IEEE CyberSA 2018 ...
Hindy, Hanan +5 more
openaire +4 more sources
Encrypted Malicious Traffic Identification Based on Hierarchical Spatiotemporal Feature and Multi-Head Attention [PDF]
To implement the full encryption of Internet,the accurate detection of encrypted malicious traffic is required,but traditional detection methods rely heavily on expert experience and perform poorly in distiguishment of encrypted traffic feature is not ...
JIANG Tongtong, YIN Weixin, CAI Bing, ZHANG Kun
doaj +1 more source
Construction of DDoS attacks malicious behavior knowledge base construction
Aiming at the problem of insufficient research on the knowledge base of distributed denial of service (DDoS) network attacks, a method for constructing a knowledge base of DDoS attacks malicious behavior was proposed.The knowledge base was constructed ...
Feiyang LIU +3 more
doaj +2 more sources

