Xie et al., 2019 - Google Patents
A method based on hierarchical spatiotemporal features for Trojan traffic detectionXie et al., 2019
View PDF- Document ID
- 5468076986215563384
- Author
- Xie J
- Li S
- Zhang Y
- Yun X
- Li J
- Publication year
- Publication venue
- 2019 IEEE 38th International Performance Computing and Communications Conference (IPCCC)
External Links
Snippet
Trojans are one of the most threatening network attacks currently. HTTP-based Trojan, in particular, accounts for a considerable proportion of them. Moreover, as the network environment becomes more complex, HTTP-based Trojan is more concealed than others. At …
- 238000001514 detection method 0 title abstract description 84
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N3/00—Computer systems based on biological models
- G06N3/02—Computer systems based on biological models using neural network models
- G06N3/06—Physical realisation, i.e. hardware implementation of neural networks, neurons or parts of neurons
- G06N3/063—Physical realisation, i.e. hardware implementation of neural networks, neurons or parts of neurons using electronic means
- G06N3/0635—Physical realisation, i.e. hardware implementation of neural networks, neurons or parts of neurons using electronic means using analogue means
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/36—Image preprocessing, i.e. processing the image information without deciding about the identity of the image
- G06K9/46—Extraction of features or characteristics of the image
- G06K9/52—Extraction of features or characteristics of the image by deriving mathematical or geometrical properties from the whole image
- G06K9/527—Scale-space domain transformation, e.g. with wavelet analysis
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/552—Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/562—Static detection
- G06F21/563—Static detection by source code analysis
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Fang et al. | Application of intrusion detection technology in network safety based on machine learning | |
Otoum et al. | As-ids: Anomaly and signature based ids for the internet of things | |
Ahmad et al. | Network intrusion detection system: A systematic study of machine learning and deep learning approaches | |
Torabi et al. | Practical autoencoder based anomaly detection by using vector reconstruction error | |
Yuan et al. | Insider threat detection with deep neural network | |
Popoola et al. | Hybrid deep learning for botnet attack detection in the internet-of-things networks | |
Marir et al. | Distributed abnormal behavior detection approach based on deep belief network and ensemble SVM using spark | |
Gwon et al. | Network intrusion detection based on LSTM and feature embedding | |
Benmessahel et al. | A new evolutionary neural networks based on intrusion detection systems using multiverse optimization | |
Folino et al. | Ensemble based collaborative and distributed intrusion detection systems: A survey | |
Süzen | Developing a multi-level intrusion detection system using hybrid-DBN | |
Alazzam et al. | A lightweight intelligent network intrusion detection system using OCSVM and Pigeon inspired optimizer | |
Reddy | Neural networks for intrusion detection and its applications | |
Ahmad et al. | Role of machine learning and data mining in internet security: standing state with future directions | |
Tabbaa et al. | An online ensemble learning model for detecting attacks in wireless sensor networks | |
Wang et al. | Fcnn: An efficient intrusion detection method based on raw network traffic | |
Wei et al. | Calibrating Network Traffic with One‐Dimensional Convolutional Neural Network with Autoencoder and Independent Recurrent Neural Network for Mobile Malware Detection | |
Ahuja et al. | DDoS attack traffic classification in SDN using deep learning | |
Wu et al. | Improving convolutional neural network-based webshell detection through reinforcement learning | |
Xie et al. | A method based on hierarchical spatiotemporal features for Trojan traffic detection | |
Wang et al. | An intrusion detection system for the internet of things based on the ensemble of unsupervised techniques | |
Surakhi et al. | The intrusion detection system by deep learning methods: issues and challenges | |
Naeem et al. | Enhancing intrusion detection: Leveraging federated learning and hybrid machine learning algorithms on ton_iot dataset | |
Zhao et al. | TBGD: Deep Learning Methods on Network Intrusion Detection Using CICIDS2017 Dataset | |
Jyotsna et al. | Enhancing IoT security through deep learning-based intrusion detection |