Flow-based intrusion detection: Techniques and challenges

MF Umer, M Sher, Y Bi - Computers & Security, 2017 - Elsevier
Flow-based intrusion detection is an innovative way of detecting intrusions in high-speed
networks. Flow-based intrusion detection only inspects the packet header and does not …

Ssh and ftp brute-force attacks detection in computer networks: Lstm and machine learning approaches

MD Hossain, H Ochiai, F Doudou… - 2020 5th international …, 2020 - ieeexplore.ieee.org
Network traffic anomaly detection is of critical importance in cybersecurity due to the massive
and rapid growth of sophisticated computer network attacks. Indeed, the more new Internet …

Detection of ssh brute force attacks using aggregated netflow data

MM Najafabadi, TM Khoshgoftaar… - 2015 IEEE 14th …, 2015 - ieeexplore.ieee.org
The SSH Brute force attack is one of the most prevalent attacks in computer networks. These
attacks aim to gain ineligible access to users' accounts by trying plenty of different password …

Security monitoring of http traffic using extended flows

M Husák, P Velan, J Vykopal - 2015 10th International …, 2015 - ieeexplore.ieee.org
In this paper, we present an analysis of HTTP traffic in a large-scale environment which uses
network flow monitoring extended by parsing HTTP requests. In contrast to previously …

Secure Socket Shell bruteforce attack detection with petri net modeling

N Tiwari, N Hubballi - IEEE Transactions on Network and …, 2022 - ieeexplore.ieee.org
Secure Socket Shell exposes a secure interface for login to remote users. Password based
authentication mechanism used by remote users is vulnerable to bruteforcing. In this attack …

Flow-based approach on bro intrusion detection

H Alaidaros, M Mahmuddin - Journal of Telecommunication …, 2017 - jtec.utem.edu.my
Abstract Packet-based or Deep Packet Inspection (DPI) intrusion detection systems (IDSs)
face challenges when coping with high volume of traffic. Processing every payload on the …

Predictions of network attacks in collaborative environment

M Husák, P Čeleda - NOMS 2020-2020 IEEE/IFIP Network …, 2020 - ieeexplore.ieee.org
This paper is a digest of the thesis on predicting cyber attacks in a collaborative
environment. While previous works mostly focused on predicting attacks as seen from a …

Measuring and circumventing Internet censorship

P Winter - 2014 - diva-portal.org
An ever increasing amount of governments, organisations, and companies employ Internet
censorship in order to filter the free flow of information. These efforts are supported by an …

[图书][B] Machine Learning Algorithms for the Analysis and Detection of Network Attacks

MM Najafabadi - 2017 - search.proquest.com
The Internet and computer networks have become an important part of our organizations
and everyday life. With the increase in our dependence on computers and communication …

Network Intrusion Detection Adversarial Attacks for LEO Constellation Networks Based on Deep Learning

Y Li, W Mo, C Li, H Wang, J He, S Hao… - … Conference on Network …, 2022 - Springer
Low-Earth orbit satellite networks have received attention from academia and industry for
their advantages in terms of wide coverage and low latency. Meantime deep learning can …