[go: up one dir, main page]

Xie et al., 2023 - Google Patents

Application‐Layer DDoS Attack Detection Using Explicit Duration Recurrent Network‐Based Application‐Layer Protocol Communication Models

Xie et al., 2023

View PDF @Full View
Document ID
1966532149103730142
Author
Xie B
Wang Y
Wen G
Xu X
Publication year
Publication venue
International Journal of Intelligent Systems

External Links

Snippet

Existing application‐layer distributed denial of service (AL‐DDoS) attack detection methods are mainly targeted at specific attacks and cannot effectively detect other types of AL‐DDoS attacks. This study presents an application‐layer protocol communication model for AL …
Continue reading at onlinelibrary.wiley.com (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1458Denial of Service
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/145Countermeasures against malicious traffic the attack involving the propagation of malware through the network, e.g. viruses, trojans or worms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1491Countermeasures against malicious traffic using deception as countermeasure, e.g. honeypots, honeynets, decoys or entrapment
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/02Details
    • H04L12/26Monitoring arrangements; Testing arrangements
    • H04L12/2602Monitoring arrangements
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1433Vulnerability analysis

Similar Documents

Publication Publication Date Title
US20250190797A1 (en) System and method for predicting domain reputation
Li et al. Detection and defense of DDoS attack–based on deep learning in OpenFlow‐based SDN
Moustafa et al. An ensemble intrusion detection technique based on proposed statistical flow features for protecting network traffic of internet of things
Yuan et al. DeepDefense: identifying DDoS attack via deep learning
Vinayakumar et al. Scalable framework for cyber threat situational awareness based on domain name systems data analysis
Ortet Lopes et al. Towards effective detection of recent DDoS attacks: A deep learning approach
US8762298B1 (en) Machine learning based botnet detection using real-time connectivity graph based traffic features
Vinayakumar et al. ScaleNet: scalable and hybrid framework for cyber threat situational awareness based on DNS, URL, and email data analysis
Niu et al. Identifying APT malware domain based on mobile DNS logging
Vinayakumar et al. A deep-dive on machine learning for cyber security use cases
Sharif et al. Detection of application-layer DDoS attacks produced by various freely accessible toolkits using machine learning
Malliga et al. A comprehensive review of deep learning techniques for the detection of (distributed) denial of service attacks
Vinayakumar et al. Improved DGA domain names detection and categorization using deep learning architectures with classical machine learning algorithms
Teixeira et al. Flow‐based intrusion detection algorithm for supervisory control and data acquisition systems: A real‐time approach
Kumar et al. Enhanced domain generating algorithm detection based on deep neural networks
Mimura et al. Heavy log reader: learning the context of cyber attacks automatically with paragraph vector
Thereza et al. Development of intrusion detection models for IoT networks utilizing CICIoT2023 dataset
Rosenthal et al. ARBA: Anomaly and reputation based approach for detecting infected IoT devices
Jafar Analysis and investigation of malicious DNS queries using CIRA-CIC-DoHBrw-2020 dataset
Alzu’bi et al. Explainable AI-based DDoS attacks classification using deep transfer learning
Tian et al. Dom-bert: Detecting malicious domains with pre-training model
Farhat et al. CADS-ML/DL: efficient cloud-based multi-attack detection system
Selim et al. DAE-BILSTM: A fog-based intrusion detection model using deep learning for IoT
Yan et al. A domain embedding model for botnet detection based on smart blockchain
Xie et al. Application‐Layer DDoS Attack Detection Using Explicit Duration Recurrent Network‐Based Application‐Layer Protocol Communication Models