[PDF][PDF] Classification of Firewall Log Data Using Multiclass Machine Learning Models. Electronics 2022, 11, 1851

M Aljabri, AA Alahmadi, RMA Mohammad… - 2022 - researchgate.net
These days, we are witnessing unprecedented challenges to network security. This indeed
confirms that network security has become increasingly important. Firewall logs are …

Klasifikasi Serangan Jaringan Menggunakan Support Vector Machine Untuk Investigasi Forensik Jaringan

M Maulana - 2023 - dspace.uii.ac.id
Perkembangan teknologi yang pesat memunculkan ancaman kejahatan di dunia digital.
Oleh karena itu, penting bagi pengguna untuk berhati-hati saat berinteraksi dalam platform …

[PDF][PDF] О СВЯЗИ ДАТАСЕТА CSE-CIC-IDS2018 С МАТРИЦЕЙ MITRE ATT&CK

ББ Борисенко, СД Ерохин, АС Фадеев… - Системы …, 2022 - media-publisher.ru
Аннотация В статье представлен обзор основных тактик развития сетевых атак
согласно матрице MITRE ATT&CK (Adversarial Tactics, Techniques & Common …

A Novel DDoS Detection and Multi-Class Classification Method: A Graph Convolutional Network Approach

B Saunders - 2024 - dr.library.brocku.ca
Distributed Denial of Service (DDoS) is an attack that overwhelms the cyber critical
infrastructure system with malicious packets causing it to become unresponsive, which …

Research Information Security and Reliability Critical Infrastructure Control Systems

I Mammadov, U Sadigov - Engineering Headway, 2024 - Trans Tech Publ
The effectiveness of the functioning communication management systems with the
information security system is analyzed on the example critical information infrastructure …

[PDF][PDF] Research Article An Assessment of Lexical, Network, and Content-Based Features for Detecting Malicious URLs Using Machine Learning and Deep Learning …

M Aljabri, F Alhaidari, RMA Mohammad, S Mirza… - 2022 - academia.edu
Research Article An Assessment of Lexical, Network, and Content-Based Features for
Detecting Malicious URLs Using Machine Learni Page 1 Research Article An Assessment …

Machine learning based Cyber Attack detection on Internet Traffic

AS Priya, A Sandhiya - International Journal of Science and Research …, 2024 - ijsra.net
Cyber attacks on the internet have become increasingly sophisticated and frequent, posing
significant challenges to cybersecurity. Traditional rule-based methods for detecting these …

[PDF][PDF] Secure and Insightful Network Infrastructure for Modern Warehousing

A Soro - 2024 - scholarworks.calstate.edu
As businesses increasingly adapt to the booming e-commerce era, the demand for more
sophisticated warehouses and fulfillment centers grows daily to manage the surging online …

Attack Traffic Network Analysis of a Brute-Force Attack against a MySQL Server

E Conderana Medem - 2023 - repositorio.comillas.edu
This thesis tries to lay the groundwork for applying data-driven methods to a campus
network attack traffic analysis. Communication networks provide the basic structure for the …

[PDF][PDF] Intelligent Systems for Cyber Defence

PCPO Trilho - run.unl.pt
One of the biggest concerns with the internet activity nowadays has to do with the increase
of cybercrime. Cybercrime is one of the biggest threats for every organization in the world …