نتایج جستجو برای: traffic detection

تعداد نتایج: 656237  

A unified method for statistical anomaly detection in intrusion detection systems is theoretically introduced. It is based on estimating a dispersion measure of numerical or symbolic data on successive moving windows in time and finding the times when a relative change of the dispersion measure is significant. Appropriate dispersion measures, relative differences, moving windows, as well as tec...

2011
Pedro Casas Johan Mazel Philippe Owezarski

Current network monitoring systems rely strongly on signature-based and supervised-learning-based detection methods to hunt out network attacks and anomalies. Despite being opposite in nature, both approaches share a common downside: they require the knowledge provided by an expert system, either in terms of anomaly signatures, or as normal-operation profiles. In a diametrically opposite perspe...

Journal: :I. J. Network Security 2014
Soniya Balram M. Wilscy

Bots are malicious software components used for generating spams, launching denial of service attacks, phishing, identity theft and information exfiltration and such other illegal activities. Bot detection is an area of active research in recent times. Here we propose a bot detection mechanism for a single host. A user traffic profile is used to filter out normal traffic generated by the host. ...

Journal: :International Journal of Communications, Network and System Sciences 2015

Journal: :International Journal for Research in Applied Science and Engineering Technology 2020

Journal: :KN - Journal of Cartography and Geographic Information 2020

Journal: :International Journal for Research in Applied Science and Engineering Technology 2017

Journal: :International Journal of Computer Applications 2019

2016
Johannes Bouche Denis Hock Martin Kappes

Anomaly Detection Systems aim to construct accurate network traffic models with the objective to discover yet unknown malicious network traffic patterns. In this paper, we study the use of the same methods in order to create a covert channel which is not discovered by Anomaly Detection Systems and can be used to exfiltrate (malicous) traffic from a network. The channel is created by imitating c...

2017
Mohamed Idhammad Karim Afdel Mustapha Belouch

DoS attack tools have become increasingly sophisticated challenging the existing detection systems to continually improve their performances. In this paper we present a victimend DoS detection method based on Artificial Neural Networks (ANN). In the proposed method a Feed-forward Neural Network (FNN) is optimized to accurately detect DoS attack with minimum resources usage. The proposed method ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید