[go: up one dir, main page]

Xie et al., 2019 - Google Patents

A method based on hierarchical spatiotemporal features for Trojan traffic detection

Xie et al., 2019

View PDF
Document ID
5468076986215563384
Author
Xie J
Li S
Zhang Y
Yun X
Li J
Publication year
Publication venue
2019 IEEE 38th International Performance Computing and Communications Conference (IPCCC)

External Links

Snippet

Trojans are one of the most threatening network attacks currently. HTTP-based Trojan, in particular, accounts for a considerable proportion of them. Moreover, as the network environment becomes more complex, HTTP-based Trojan is more concealed than others. At …
Continue reading at arxiv.org (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06NCOMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N3/00Computer systems based on biological models
    • G06N3/02Computer systems based on biological models using neural network models
    • G06N3/06Physical realisation, i.e. hardware implementation of neural networks, neurons or parts of neurons
    • G06N3/063Physical realisation, i.e. hardware implementation of neural networks, neurons or parts of neurons using electronic means
    • G06N3/0635Physical realisation, i.e. hardware implementation of neural networks, neurons or parts of neurons using electronic means using analogue means
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/36Image preprocessing, i.e. processing the image information without deciding about the identity of the image
    • G06K9/46Extraction of features or characteristics of the image
    • G06K9/52Extraction of features or characteristics of the image by deriving mathematical or geometrical properties from the whole image
    • G06K9/527Scale-space domain transformation, e.g. with wavelet analysis
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/552Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/562Static detection
    • G06F21/563Static detection by source code analysis

Similar Documents

Publication Publication Date Title
Fang et al. Application of intrusion detection technology in network safety based on machine learning
Otoum et al. As-ids: Anomaly and signature based ids for the internet of things
Ahmad et al. Network intrusion detection system: A systematic study of machine learning and deep learning approaches
Torabi et al. Practical autoencoder based anomaly detection by using vector reconstruction error
Yuan et al. Insider threat detection with deep neural network
Popoola et al. Hybrid deep learning for botnet attack detection in the internet-of-things networks
Marir et al. Distributed abnormal behavior detection approach based on deep belief network and ensemble SVM using spark
Gwon et al. Network intrusion detection based on LSTM and feature embedding
Benmessahel et al. A new evolutionary neural networks based on intrusion detection systems using multiverse optimization
Folino et al. Ensemble based collaborative and distributed intrusion detection systems: A survey
Süzen Developing a multi-level intrusion detection system using hybrid-DBN
Alazzam et al. A lightweight intelligent network intrusion detection system using OCSVM and Pigeon inspired optimizer
Reddy Neural networks for intrusion detection and its applications
Ahmad et al. Role of machine learning and data mining in internet security: standing state with future directions
Tabbaa et al. An online ensemble learning model for detecting attacks in wireless sensor networks
Wang et al. Fcnn: An efficient intrusion detection method based on raw network traffic
Wei et al. Calibrating Network Traffic with One‐Dimensional Convolutional Neural Network with Autoencoder and Independent Recurrent Neural Network for Mobile Malware Detection
Ahuja et al. DDoS attack traffic classification in SDN using deep learning
Wu et al. Improving convolutional neural network-based webshell detection through reinforcement learning
Xie et al. A method based on hierarchical spatiotemporal features for Trojan traffic detection
Wang et al. An intrusion detection system for the internet of things based on the ensemble of unsupervised techniques
Surakhi et al. The intrusion detection system by deep learning methods: issues and challenges
Naeem et al. Enhancing intrusion detection: Leveraging federated learning and hybrid machine learning algorithms on ton_iot dataset
Zhao et al. TBGD: Deep Learning Methods on Network Intrusion Detection Using CICIDS2017 Dataset
Jyotsna et al. Enhancing IoT security through deep learning-based intrusion detection