• No results found

malicious traffic

Processing Overhead Reduced Effficient Malicious Traffic Flow Detection using Modified Firecol

Processing Overhead Reduced Effficient Malicious Traffic Flow Detection using Modified Firecol

... perform traffic flow analyses before allowing traffic data into the primary server, so that network collusion can be avoided ...the malicious traffic flow detection metrics such as ...

10

Optimization of Malicious Traffic in Optimal
Source Based Filtering

Optimization of Malicious Traffic in Optimal Source Based Filtering

... from malicious traffic is a hard problem that requires the coordination of several complementary components, including nontechnical and technical solutions (at the application and/or network ...

6

Analysis of malicious traffic and its impact to QoS metric LRD and energy invariant

Analysis of malicious traffic and its impact to QoS metric LRD and energy invariant

... of malicious are buried under the normal traces event though LRD (or Hurst value) is ...of malicious packets that exist inside normal traffic ...anomaly traffic to QoS metric ...

7

Sliding Window Based Malicious Traffic Detection in Network using Newcombs Law

Sliding Window Based Malicious Traffic Detection in Network using Newcombs Law

... network traffic information utilizing natural law to recognize malicious and non-malicious network traffic and, to inspect and think about the ...recognize malicious and typical network ...

6

PeerShark: flow-clustering and conversation-generation for malicious peer-to-peer traffic identification

PeerShark: flow-clustering and conversation-generation for malicious peer-to-peer traffic identification

... As has been explained before, the present works utiliz- ing conversation-based (or super-flow based) approaches [22,32] did not have the capabilities to detect a system infected by a P2P bot if it is running benign P2P ...

12

International Journal of Computer Science and Mobile Computing

International Journal of Computer Science and Mobile Computing

... of malicious traffic detection techniques, and thus, vulnerabilities in common security components, such as firewalls are ...of malicious traffic, network communications, and computer system ...

5

Network Based Peer To Peer Botnet Detection

Network Based Peer To Peer Botnet Detection

... Chart -4 shows the measured packet ratio for traffic flow that generate from each PC in the analysis. Both legitimate traffics have a ratio that is between 0.5 and 1.0. A high ratio for p2p applications can be ...

8

AN  ANALYSIS  FRAMEWORK  FOR  SECURITY  IN  WEB APPLICATIONS

AN ANALYSIS FRAMEWORK FOR SECURITY IN WEB APPLICATIONS

... investigated malicious traffic containing the following technical attacks: Remote File Inclusion (RFI), SQL Injection (SQLi), Local File Inclusion (LFI), Cross Site Scripting (XSS) and Directory Traversal ...

7

Mitigating DDoS Attacks on Cloud Networks with Hypervisor Based Security

Mitigating DDoS Attacks on Cloud Networks with Hypervisor Based Security

... isolate malicious traffic from the normal ...cost Traffic Engineering approach and can prove to be efficient mechanism to improve DDoS detection over Cloud data center ...exponential traffic ...

7

Vol 3, No 10 (2015)

Vol 3, No 10 (2015)

... of malicious traffic and slow within the filtering of specific attacks within the ...a malicious attacks. The matter of block malicious traffic on the net via source-based ...legitimate ...

6

Hybrid Intrusion detection
network monitoring with honeypots

Hybrid Intrusion detection network monitoring with honeypots

... redirect traffic to honeypots use alerts to preselect (future) traffic for ...if traffic were to be pre-filtered for malicious traffic using lightweight anomaly based detectors and so ...

82

Identifying Malicious Data in Social Media

Identifying Malicious Data in Social Media

... of traffic features has received a lot of attention in the research ...Disclosing malicious traffic for network security using entropy based approach and power law distribution is ...as ...

7

Towards 5G Intrusion Detection Scenarios with OMNeT++

Towards 5G Intrusion Detection Scenarios with OMNeT++

... the malicious SYN messages received from the attack ...of malicious nodes does not impact the performance of the application, which implies that the controller application could scale well in terms of the ...

8

Performance Evaluation of Different Pattern Matching Algorithms of Snort

Performance Evaluation of Different Pattern Matching Algorithms of Snort

... both malicious traffic and CDX- 2009 ...and malicious traffic, ac-q gives the best ...and malicious traffic, but in case of CDX-2009 dataset, ac- banded and ac-sparsebands ...

6

Decentralized Firewall as a Service (D-FAAS) Applicability Model with Improved Queuing Using Dynamic Support for Cloud

Decentralized Firewall as a Service (D-FAAS) Applicability Model with Improved Queuing Using Dynamic Support for Cloud

... Cloud is a trusted third party service based computing having effective resource allocation policies. These policies are responsible for serving the user’s needs in a controlled manner. As far as security is concerned, ...

7

Monitoring and Analysing Anomaly Activities in a Network using Packetbeat

Monitoring and Analysing Anomaly Activities in a Network using Packetbeat

... creating traffic along with their IP address in one graph shown in fig 6a and top hosts receiving traffic in another graph shown in fig ...creating traffic indicates all the communicating hosts in ...

5

Malicious Domain Detection Based on Traffic Similarity

Malicious Domain Detection Based on Traffic Similarity

... botnet traffic collection is difficult, researchers have simulated the traffic of botnets by analyzing the behavioral characteristics of ...the traffic during two intervals as Figure ...

6

A Review of Congestion Control with EDA Shortest Path and Malicious Detection in Real Time Traffic

A Review of Congestion Control with EDA Shortest Path and Malicious Detection in Real Time Traffic

... multimedia traffic. To enhanced communicate multimedia traffic, the IETF has normalized the innovative "TCP Friendly Rate Control (FLOW RATE CONTROL) protocol" ...

7

A novel intrusion detection method based on OCSVM and K-means recursive clustering

A novel intrusion detection method based on OCSVM and K-means recursive clustering

... non malicious datasets for the evaluatioin of the proposed ...containing malicious attacks are available an extensive evaluation of the K−OCSVM method is going to be conducted in terms of accuracy and false ...

10

Keylogger Detection using Memory Forensic and Network Monitoring

Keylogger Detection using Memory Forensic and Network Monitoring

... The best approach for message communication between sender and receiver is to send the data in such a way that without the original receiver no one should be able to read that. Stefano Ortolani proposed in his Keylogger ...

5

Show all 6692 documents...

Related subjects