Results 21 to 30 of about 4,251 (194)

Realtime Malicious Traffic Detection Targeted for TCP Out-of-Order Packets Based on FPGA

open access: yesIEEE Access, 2023
Currently, with the increasing popularity of high-speed network, in order to protect the network environment, more and more companies start to explore how to efficiently detect malicious traffic.
Zhenguo Hu   +3 more
doaj   +1 more source

Research on Malicious Encrypted Traffic Annotation Method for Android Mobile Application [PDF]

open access: yesJisuanji gongcheng, 2020
In order to distinguish malicious traffic generated by running malicious Android applications from normal traffic,this paper proposes a method for annotating malicious traffic of mobile Android applications.For encrypted network traffic,encryption ...
HE Gaofeng, SI Yongrui, XU Bingfeng
doaj   +1 more source

A Payload Based Malicious HTTP Traffic Detection Method Using Transfer Semi-Supervised Learning

open access: yesApplied Sciences, 2021
Malicious HTTP traffic detection plays an important role in web application security. Most existing work applies machine learning and deep learning techniques to build the malicious HTTP traffic detection model.
Tieming Chen   +6 more
doaj   +1 more source

Improved malicious node detection method for detecting a bait in an extensive network for getting the maximum throughput

open access: yesIET Communications, EarlyView., 2022
Abstract Mobile Ad‐hoc Network (MANET) is an ad hoc Wireless subset with a unique dynamic geometry of the system and movable nodes. The MANETs are auto‐organized networks that permit mobility without infrastructure. Specific protocols for MANET routing are provided with these attributes.
Shalini Goel   +5 more
wiley   +1 more source

Malicious Traffic Detection Using K-means

open access: yesThe Journal of Korean Institute of Communications and Information Sciences, 2016
Various network attacks such as DDoS(Distributed Denial of service) and orm are one of the biggest problems in the modern society. These attacks reduce the quality of internet service and caused the cyber crime. To solve the above problem, signature based IDS(Intrusion Detection System) has been developed by network vendors.
Dong Hyuk Shin   +3 more
openaire   +2 more sources

Research on Network Malicious Traffic Detection for Post-Exploitation Attack Behavior [PDF]

open access: yesJisuanji gongcheng
Existing post-exploitation behavior studies mainly focus on the host side of the attack and defense countermeasures, and lack pattern analysis and detection methods for the traffic side.
LIANG Songlin, LIN Wei, WANG Jue, YANG Qing
doaj   +1 more source

Research on Malicious Mobile Application Detection Based on Domain Name Association [PDF]

open access: yesJisuanji gongcheng, 2020
In order to realize the accurate detection of malicious mobile applications and ensure the security of mobile devices,a malicious mobile application detection method based on DNS is proposed.DNS domain name is used as the analysis object of detection to ...
CAI Rongyan, WANG He, YAO Qigui, HE Gaofeng
doaj   +1 more source

A Taxonomy of Malicious Traffic for Intrusion Detection Systems [PDF]

open access: yes2018 International Conference On Cyber Situational Awareness, Data Analytics And Assessment (Cyber SA), 2018
4 Pages, 2 Figures, Accepted in IEEE CyberSA 2018 ...
Hindy, Hanan   +5 more
openaire   +4 more sources

Encrypted Malicious Traffic Identification Based on Hierarchical Spatiotemporal Feature and Multi-Head Attention [PDF]

open access: yesJisuanji gongcheng, 2021
To implement the full encryption of Internet,the accurate detection of encrypted malicious traffic is required,but traditional detection methods rely heavily on expert experience and perform poorly in distiguishment of encrypted traffic feature is not ...
JIANG Tongtong, YIN Weixin, CAI Bing, ZHANG Kun
doaj   +1 more source

Construction of DDoS attacks malicious behavior knowledge base construction

open access: yesDianxin kexue, 2021
Aiming at the problem of insufficient research on the knowledge base of distributed denial of service (DDoS) network attacks, a method for constructing a knowledge base of DDoS attacks malicious behavior was proposed.The knowledge base was constructed ...
Feiyang LIU   +3 more
doaj   +2 more sources

Home - About - Disclaimer - Privacy