• No results found

[PDF] Top 20 Malicious Domain Detection Based on Traffic Similarity

Has 10000 "Malicious Domain Detection Based on Traffic Similarity" found on our website. Below are the top 20 most common "Malicious Domain Detection Based on Traffic Similarity".

Malicious Domain Detection Based on Traffic Similarity

Malicious Domain Detection Based on Traffic Similarity

... Internet. Malicious domain detection techniques are used to find the malicious domains which are designed for malicious ...existing malicious domain detection ... See full document

6

Network Based Peer To Peer Botnet Detection

Network Based Peer To Peer Botnet Detection

... network based peer-to-peer botnet detection by means of network flow ...A detection algorithm, which is based on behaviors that isolate malicious from legitimate p2p traffic, is ... See full document

8

Sliding Window Based Malicious Traffic Detection in Network using Newcombs Law

Sliding Window Based Malicious Traffic Detection in Network using Newcombs Law

... which can reflect intrusion attributes viably; consolidate abuse discovery, anomaly location and human mediation, build up rule library in view of C.45 decision tree calculation and utilize the ideal example coordinating ... See full document

6

Processing Overhead Reduced Effficient Malicious Traffic Flow Detection using Modified Firecol

Processing Overhead Reduced Effficient Malicious Traffic Flow Detection using Modified Firecol

... and detection is more concentrated research issue which is done in our previous work by introducing Burst Transmission aware DDOS Attack Detection (BT-DDOSAD) ...where traffic analysis processes ... See full document

10

Detecting Active Bot Networks Based on DNS Traffic Analysis

Detecting Active Bot Networks Based on DNS Traffic Analysis

... 2. Domain-fluxing (domain generation algorithms): In this technique, instead of a fixed embedded domain name, the malware is equipped with an algorithm which is known as DGA (domain generation ... See full document

14

Network Level Anomaly Detection System with Principal Component Analysis

Network Level Anomaly Detection System with Principal Component Analysis

... anomaly based intrusion detection are helping to detect malicious activities at ...network traffic data. System performs the score based detection of anomaly with moderate ... See full document

7

A Review of Congestion Control with EDA Shortest Path and Malicious Detection in Real Time Traffic

A Review of Congestion Control with EDA Shortest Path and Malicious Detection in Real Time Traffic

... The "TCP-Friendly Rate Control" is a congestion control mechanism for unicast flows that participate with TCP traffic in the best-effort Internet environment [13], [30], [45]. This mechanism has been ... See full document

7

A Dynamic Approach of Malicious Node Detection for Internet Traffic Analysis

A Dynamic Approach of Malicious Node Detection for Internet Traffic Analysis

... network traffic measurement of Peer-to- Peer (P2P) applications on the ...the domain name system are used to identify the appropriate next-hop destination for a message being ... See full document

7

Catching Flux networks in the open

Catching Flux networks in the open

... novel detection methodology called ...of domain names and IP addresses which are related and could be a potential flux ...deemed malicious or ...potential malicious network, so at least one ... See full document

89

Survey on Delay Based Jellyfish Attack

Survey on Delay Based Jellyfish Attack

... from detection and diagnosis, but the malicious node can attack the traffic via itself by reordering packets, dropping packets periodically, or increasing jitters ...TCP traffic in that ... See full document

6

Malicious Domain Detection Based on Machine Learning

Malicious Domain Detection Based on Machine Learning

... flexible domain and IP address to hide and change C&C ...on. Based on the changeable domain and domain generation algorithm, botnet can be divided into two types, Fast-flux [6], and ...the ... See full document

11

Hybrid Intrusion detection
network monitoring with honeypots

Hybrid Intrusion detection network monitoring with honeypots

... network-based detection, rather then redirect traffic to honeypots use alerts to preselect (future) traffic for ...network-based detection are attractive because of high accuracy ... See full document

82

The Design and Implementation of a Covering MDN Complete Life Cycle Malicious Domain Detection Framework

The Design and Implementation of a Covering MDN Complete Life Cycle Malicious Domain Detection Framework

... a malicious domain name detection method based on the graph inference, they construct a host-domain graph from HTTP proxy logs, and set the graph with minimal ground truth information, ... See full document

15

A Survey on DSR-Based Routing with Hybrid Defence for Mitigating Collaborative Attacks Using CBDS in VANET

A Survey on DSR-Based Routing with Hybrid Defence for Mitigating Collaborative Attacks Using CBDS in VANET

... Network Domain, the development of a special category of wireless ad hoc networks called Vehicular Ad-hoc Network ...of malicious nodes, Preventing or detecting malicious nodes launching Grayhole or ... See full document

8

Optimization of Malicious Traffic in Optimal
Source Based Filtering

Optimization of Malicious Traffic in Optimal Source Based Filtering

... malignant traffic will ...intrusion detection system (IDS) is ...blocking malicious traffic, a filter is a simple ACL rule that denies access to a source IP address or ... See full document

6

Keylogger Detection using Memory Forensic and Network Monitoring

Keylogger Detection using Memory Forensic and Network Monitoring

... for detection of this malicious program which includes API based detection method and network traffic monitoring ...analysis based detection ... See full document

5

A correlated Bayesian game theory with 
		extended credit score for identifying malicious and selfish node in 
		MANET

A correlated Bayesian game theory with extended credit score for identifying malicious and selfish node in MANET

... forwarding traffic unrelated to its personal ...Equilibrium based IDS for MANET is used for detecting the malicious node and normal node in the ...detect malicious and selfish node ... See full document

7

A novel intrusion detection method based on OCSVM and K-means recursive clustering

A novel intrusion detection method based on OCSVM and K-means recursive clustering

... intrusion detection module capable of detecting malicious network traffic in a SCADA (Supervisory Control and Data Acquisition) system, based on the combination of One-Class Support Vector ... See full document

10

Anomaly Detection Using Context-Based Intrusion
          Detection System

Anomaly Detection Using Context-Based Intrusion Detection System

... intrusion detection system looks out for malicious events which could be an intrusion in disguise, by monitoring traffic on a ...network traffic, it also scans system files to look for any ... See full document

6

Dual Embeddings and Metrics for Relational Similarity

Dual Embeddings and Metrics for Relational Similarity

... topical similarity while the dependency-based word embeddings with syntactic contexts can capture more functional ...a domain space and a function space, where the domain or topic of a word is ... See full document

7

Show all 10000 documents...