The explosive growth in network traffic in recent times has resulted in increased processing pressure on network intrusion detection systems. In addition, there is a lack of reliable methods for preprocessing network traffic generated by benign applications that do not steal users’ data from their devices. To alleviate these problems, this study analyzed the differences between benign and malicious traffic produced by benign applications and malware, respectively. To fully express these differences, this study proposed a new set of statistical features for training a clustering model. Furthermore, to mine the communication channels generated by benign applications in batches, a semisupervised clustering method was adopted. Using a small num...
AbstractThis paper presents a machine learning approach to large-scale monitoring for malicious acti...
Due to the growth in prominence of Web, there is a need for proficient system administration. Networ...
Network attacks of the distributed denial of service (DDoS) form are used to disrupt server replies ...
Recently data mining methods have gained importance in addressing network security issues, including...
Recently, the amount of encrypted malicious network traffic masquerading as normal traffic of data h...
International audienceThe unsupervised detection of network attacks represents an extremely challeng...
The necessary spread of the access points to network services makes them vulnerable to many potentia...
Internet of Things (IoT) devices are becoming increasingly prevalent as time goes on, as they presen...
Real-time network traffic anomaly detection is crucial for the confidentiality, integrity, and secur...
Developing malware variants is extremely cheap for attackers because of the availability of various ...
Nowadays, computer networks have become incredibly complex due to the evolution of online services a...
Publisher Copyright: © 2022 The Author(s)Analyzing non-labeled data is a major concern in the field ...
none4Network intrusion detection is a key security issue that can be tackled by means of different a...
MOVICAB-IDS has been previously proposed as a hybrid intelligent Intrusion Detection System (IDS). T...
Modern computer network defense systems rely primarily on signature-based intrusion detection tools,...
AbstractThis paper presents a machine learning approach to large-scale monitoring for malicious acti...
Due to the growth in prominence of Web, there is a need for proficient system administration. Networ...
Network attacks of the distributed denial of service (DDoS) form are used to disrupt server replies ...
Recently data mining methods have gained importance in addressing network security issues, including...
Recently, the amount of encrypted malicious network traffic masquerading as normal traffic of data h...
International audienceThe unsupervised detection of network attacks represents an extremely challeng...
The necessary spread of the access points to network services makes them vulnerable to many potentia...
Internet of Things (IoT) devices are becoming increasingly prevalent as time goes on, as they presen...
Real-time network traffic anomaly detection is crucial for the confidentiality, integrity, and secur...
Developing malware variants is extremely cheap for attackers because of the availability of various ...
Nowadays, computer networks have become incredibly complex due to the evolution of online services a...
Publisher Copyright: © 2022 The Author(s)Analyzing non-labeled data is a major concern in the field ...
none4Network intrusion detection is a key security issue that can be tackled by means of different a...
MOVICAB-IDS has been previously proposed as a hybrid intelligent Intrusion Detection System (IDS). T...
Modern computer network defense systems rely primarily on signature-based intrusion detection tools,...
AbstractThis paper presents a machine learning approach to large-scale monitoring for malicious acti...
Due to the growth in prominence of Web, there is a need for proficient system administration. Networ...
Network attacks of the distributed denial of service (DDoS) form are used to disrupt server replies ...