An important part of maintaining network security is collecting and processing information about cyber threats, both from network operator's own detection tools and from third parties. A commonly used type of such information are lists of network entities (IP addresses, domains, URLs, etc.) which were identified as malicious. However, in many cases, the simple binary distinction between malicious and non-malicious entities is not sufficient. It is beneficial to keep other supplementary information for each entity, which describes its malicious activities, and also a summarizing score, which evaluates its reputation numerically. Such a score allows for quick comprehension of the level of threat the entity poses and allows to compare and sort...
OA-julkaisu. Tuo IEEE:n tietokannasta, kun julkaistu.Attacks over the Internet are becoming more and...
AbstractThe primary intent of this paper is detect malicious traffic at the network level. To this e...
This research examines the use of machine-learning techniques to identify malicious traffic in an em...
We describe a guilt-by-association system that can be used to rank networked entities by their suspi...
Part 7: Network and Internet SecurityInternational audienceThe Domain Name System (DNS) is an essent...
Inter and intra-network connectivity have become a useful resource for accessibility and flexibility...
abstract: IP blacklisting is a popular technique to bolster an enterprise's security, where access t...
Nowadays, computer networks have become incredibly complex due to the evolution of online services a...
Malicious traffic poses a significant threat to network systems and the security of sensitive data. ...
Reputation has long been an important factor for establishing trust and evaluating the character of ...
Research Background Problem Statement • The first defence mechanism in an organization is the netwo...
Various Denial of Service (DoS) attacks are common phenomena in the Internet. They can consume resou...
Modern computer network defense systems rely primarily on signature-based intrusion detection tools,...
Abstract New and unseen polymorphic malware, zero-day attacks, or other types of advanced persistent...
Cybersecurity is an arms race, with both the security and the adversaries attempting to outsmart one...
OA-julkaisu. Tuo IEEE:n tietokannasta, kun julkaistu.Attacks over the Internet are becoming more and...
AbstractThe primary intent of this paper is detect malicious traffic at the network level. To this e...
This research examines the use of machine-learning techniques to identify malicious traffic in an em...
We describe a guilt-by-association system that can be used to rank networked entities by their suspi...
Part 7: Network and Internet SecurityInternational audienceThe Domain Name System (DNS) is an essent...
Inter and intra-network connectivity have become a useful resource for accessibility and flexibility...
abstract: IP blacklisting is a popular technique to bolster an enterprise's security, where access t...
Nowadays, computer networks have become incredibly complex due to the evolution of online services a...
Malicious traffic poses a significant threat to network systems and the security of sensitive data. ...
Reputation has long been an important factor for establishing trust and evaluating the character of ...
Research Background Problem Statement • The first defence mechanism in an organization is the netwo...
Various Denial of Service (DoS) attacks are common phenomena in the Internet. They can consume resou...
Modern computer network defense systems rely primarily on signature-based intrusion detection tools,...
Abstract New and unseen polymorphic malware, zero-day attacks, or other types of advanced persistent...
Cybersecurity is an arms race, with both the security and the adversaries attempting to outsmart one...
OA-julkaisu. Tuo IEEE:n tietokannasta, kun julkaistu.Attacks over the Internet are becoming more and...
AbstractThe primary intent of this paper is detect malicious traffic at the network level. To this e...
This research examines the use of machine-learning techniques to identify malicious traffic in an em...