Zobrazeno 1 - 10
of 1 276
pro vyhledávání: '"netflow"'
Autor:
Edward Chuah, Neeraj Suri
Publikováno v:
Cybersecurity, Vol 7, Iss 1, Pp 1-22 (2024)
Abstract Reflection attacks are one of the most intimidating threats organizations face. A reflection attack is a special type of distributed denial-of-service attack that amplifies the amount of malicious traffic by using reflectors and hides the id
Externí odkaz:
https://doaj.org/article/134ee8322ec84f2b9ee103306769f76f
Publikováno v:
IEEE Access, Vol 12, Pp 69397-69409 (2024)
Botnets pose a significant challenge to network security but are difficult to detect because of their dynamic and evolving nature, which limits the effectiveness of conventional supervised neural network detection methods. To address this problem, th
Externí odkaz:
https://doaj.org/article/2b4fe54447134cb98640894fe190c6dc
Autor:
Touati B. Adli, Salem-Bilal B. Amokrane, Boban Z. Pavlović, Mohammad Zouaoui M. Laidouni, Taki-eddine Ahmed A. Benyahia
Publikováno v:
Vojnotehnički Glasnik, Vol 71, Iss 4, Pp 941-969 (2023)
Introduction/purpose: Anomaly detection-based Network Intrusion Detection Systems (NIDSs) have emerged as a valuable tool, particularly in military fields, for protecting networks against cyberattacks, specifically focusing on Netflow data, to identi
Externí odkaz:
https://doaj.org/article/2f0d10a6fb52416f8a677871dc569fdf
Publikováno v:
Journal of Cloud Computing: Advances, Systems and Applications, Vol 12, Iss 1, Pp 1-14 (2023)
Abstract In the current era, a tremendous volume of data has been generated by using web technologies. The association between different devices and services have also been explored to wisely and widely use recent technologies. Due to the restriction
Externí odkaz:
https://doaj.org/article/26ab32e1bb174cd1a7c5dc29f54ea0ab
Publikováno v:
Journal of Big Data, Vol 10, Iss 1, Pp 1-30 (2023)
Abstract With the massive resources and strategies accessible to attackers, countering Denial of Service (DoS) attacks is getting increasingly difficult. One of these techniques is application-layer DoS. Due to these challenges, network security has
Externí odkaz:
https://doaj.org/article/4e1c0cf815714079a7dded9b55d86b82
Publikováno v:
IEEE Access, Vol 11, Pp 20351-20364 (2023)
Intrusion detection systems (IDS) play a vital role in protecting networks from malicious attacks. Modern IDS use machine-learning or deep-learning models to deal with the diversity of attacks that malicious users may employ. However, effective machi
Externí odkaz:
https://doaj.org/article/4d9ea775889348b89ce64a0749ee33de
Autor:
Vsevolod Kapustin, Nerijus Paulauskas
Publikováno v:
Mokslas: Lietuvos Ateitis, Vol 15 (2023)
Traffic analysis is a common question for most of the production systems in various segments of computer networks. Attacks, configuration mistakes, and other factors can cause network increased accessibility and as a result danger for data privacy. A
Externí odkaz:
https://doaj.org/article/d9fbbc76b0bd451c8591e991b36cd7ed
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Publikováno v:
IEEE Access, Vol 10, Pp 85792-85817 (2022)
This paper presents an online anomaly detection system capable of handling operational network traffic of large networks (such as an ISP). We also aim for an effective and practical diagnosis of anomalies diagnosis to produce actionable intelligence
Externí odkaz:
https://doaj.org/article/8dcf82636b9249c6a77f7883c1570ff9