Cyber attacks mitigation: Detecting malicious activities in network traffic–A review of literature

S Prabhu - … Mitigation: Detecting Malicious Activities in Network …, 2020 - papers.ssrn.com
activities. This survey aims to tackle Trust, Protection, identification and activity on wide scale
networks … injection attacks, botnets or other malicious activities will be investigated. In this …

Mitigation of malicious attacks on networks

CM Schneider, AA Moreira… - Proceedings of the …, 2011 - National Acad Sciences
… Under these constraints, we propose the following algorithm to mitigate malicious attacks.
In the original network we swap the connections of two randomly chosen edges, that is, the …

A framework for DNS based detection and mitigation of malware infections on a network

E Stalmans, B Irwin - 2011 Information Security for South Africa, 2011 - ieeexplore.ieee.org
… for detecting malicious network activity through DNS … of malicious fast-flux service networks
through the passive analysis of recursive DNS traffic traces [7]. Common features in malicious

IoT-KEEPER: Detecting malicious IoT network activity using online traffic analysis at the edge

I Hafeez, M Antikainen, AY Ding… - … on Network and …, 2020 - ieeexplore.ieee.org
… IoT device generating this activity, and … malicious network activity. Our evaluation also shows
that IOT-KEEPER has low resource footprint, and it can detect and mitigate various network

A survey on malware analysis and mitigation techniques

SS Chakkaravarthy, D Sangeetha, V Vaidehi - Computer Science Review, 2019 - Elsevier
… the OS activities and legitimate traffic. It is difficult to detect and distinct malicious activities as
… (ii) In order to evade from the network security restrictions, the attacker makes use of trusted …

Malicious node prevention and mitigation in MANETs using a hybrid security model

A Naveena, KRL Reddy - Information Security Journal: A Global …, 2018 - Taylor & Francis
… to accommodate defense against malicious attacker. Malicious nodes have opportunities to
… functions, and elliptic curve cryptographic to mitigate attacks in the MANET. The simulation is …

Mitigating Malware Threats at Small Medium Enterprise (SME) Organisation: A Review and Framework

MMA Mutalib, Z Zainol… - 2021 6th IEEE International …, 2021 - ieeexplore.ieee.org
… in the IT network environment can be detected and identified by the CMERP sensor system.
Collection of information from network sandboxes such as malicious binary, network traffic, …

[PDF][PDF] Towards malicious network activity mitigation through subnet reputation analysis

A Herbert, B Irwin - Southern Africa Telecommunication Networks …, 2016 - researchgate.net
… to better mitigate malicious activities targeted at the network, or within the network itself. …
[17], can provide mitigation of malicious network activity on your behalf in order to keep one’…

Mitigation of malicious flooding in software defined networks using dynamic access control list

J Ramprasath, V Seethalakshmi - Wireless Personal Communications, 2021 - Springer
… target network address using a service point address, packets/traffic are filtered. The malicious
flood mitigation … incoming packets/traffic on the home network using Table-r3 data. The …

A survey of distributed denial-of-service attack, prevention, and mitigation techniques

T Mahjabin, Y Xiao, G Sun… - … Sensor Networks, 2017 - journals.sagepub.com
… Also, another and more vulnerable impact of the attack is the depletion of the network
bandwidths. In this case, an excessive amount of malicious flows overwhelm the network