Xie et al., 2023 - Google Patents
Application‐Layer DDoS Attack Detection Using Explicit Duration Recurrent Network‐Based Application‐Layer Protocol Communication ModelsXie et al., 2023
View PDF- Document ID
- 1966532149103730142
- Author
- Xie B
- Wang Y
- Wen G
- Xu X
- Publication year
- Publication venue
- International Journal of Intelligent Systems
External Links
Snippet
Existing application‐layer distributed denial of service (AL‐DDoS) attack detection methods are mainly targeted at specific attacks and cannot effectively detect other types of AL‐DDoS attacks. This study presents an application‐layer protocol communication model for AL …
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1458—Denial of Service
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/145—Countermeasures against malicious traffic the attack involving the propagation of malware through the network, e.g. viruses, trojans or worms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1491—Countermeasures against malicious traffic using deception as countermeasure, e.g. honeypots, honeynets, decoys or entrapment
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/02—Details
- H04L12/26—Monitoring arrangements; Testing arrangements
- H04L12/2602—Monitoring arrangements
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1433—Vulnerability analysis
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US20250190797A1 (en) | System and method for predicting domain reputation | |
| Li et al. | Detection and defense of DDoS attack–based on deep learning in OpenFlow‐based SDN | |
| Moustafa et al. | An ensemble intrusion detection technique based on proposed statistical flow features for protecting network traffic of internet of things | |
| Yuan et al. | DeepDefense: identifying DDoS attack via deep learning | |
| Vinayakumar et al. | Scalable framework for cyber threat situational awareness based on domain name systems data analysis | |
| Ortet Lopes et al. | Towards effective detection of recent DDoS attacks: A deep learning approach | |
| US8762298B1 (en) | Machine learning based botnet detection using real-time connectivity graph based traffic features | |
| Vinayakumar et al. | ScaleNet: scalable and hybrid framework for cyber threat situational awareness based on DNS, URL, and email data analysis | |
| Niu et al. | Identifying APT malware domain based on mobile DNS logging | |
| Vinayakumar et al. | A deep-dive on machine learning for cyber security use cases | |
| Sharif et al. | Detection of application-layer DDoS attacks produced by various freely accessible toolkits using machine learning | |
| Malliga et al. | A comprehensive review of deep learning techniques for the detection of (distributed) denial of service attacks | |
| Vinayakumar et al. | Improved DGA domain names detection and categorization using deep learning architectures with classical machine learning algorithms | |
| Teixeira et al. | Flow‐based intrusion detection algorithm for supervisory control and data acquisition systems: A real‐time approach | |
| Kumar et al. | Enhanced domain generating algorithm detection based on deep neural networks | |
| Mimura et al. | Heavy log reader: learning the context of cyber attacks automatically with paragraph vector | |
| Thereza et al. | Development of intrusion detection models for IoT networks utilizing CICIoT2023 dataset | |
| Rosenthal et al. | ARBA: Anomaly and reputation based approach for detecting infected IoT devices | |
| Jafar | Analysis and investigation of malicious DNS queries using CIRA-CIC-DoHBrw-2020 dataset | |
| Alzu’bi et al. | Explainable AI-based DDoS attacks classification using deep transfer learning | |
| Tian et al. | Dom-bert: Detecting malicious domains with pre-training model | |
| Farhat et al. | CADS-ML/DL: efficient cloud-based multi-attack detection system | |
| Selim et al. | DAE-BILSTM: A fog-based intrusion detection model using deep learning for IoT | |
| Yan et al. | A domain embedding model for botnet detection based on smart blockchain | |
| Xie et al. | Application‐Layer DDoS Attack Detection Using Explicit Duration Recurrent Network‐Based Application‐Layer Protocol Communication Models |