Zobrazeno 1 - 6
of 6
pro vyhledávání: '"Pratibha Khandait"'
Publikováno v:
IET Networks, Vol 10, Iss 2, Pp 59-75 (2021)
Abstract With the proliferation of IoT devices, network management and security monitoring are becoming a challenge. For the timely detection of IoT device status and their behaviour, traffic classification methods are used. Herein, IoTHunter, a Deep
Externí odkaz:
https://doaj.org/article/2e7b20f6a391493d8693947d5a9f4245
Autor:
Neminath Hubballi, Pratibha Khandait
Publikováno v:
Computer Communications. 185:79-91
Publikováno v:
IET Networks, Vol 10, Iss 2, Pp 59-75 (2021)
With the proliferation of IoT devices, network management and security monitoring are becoming a challenge. For the timely detection of IoT device status and their behaviour, traffic classification methods are used. Herein, IoTHunter, a Deep Packet I
Publikováno v:
ICDCN (Adjunct Volume)
Secure Socket Shell (SSH) allows users to connect and access the system remotely through a publicly exposed interface. These systems often become the target of attacks where an intruder attempts to break into a system by guessing login credentials. T
Publikováno v:
AsiaCCS
Web applications are often exploited using different techniques like injection, buffer overflow, etc. An HTTP request carrying such malicious content will be different from a normal request. In this paper we propose to detect such anomalous HTTP requ
Publikováno v:
AsiaCCS
In this paper we propose a method to detect distributed bruteforcing by modeling failed login attempts as a Poisson probability distribution. We use content similarity between known SSH connection and flow characteristics of failed login attempts to