Learning near-optimal intrusion responses against dynamic attackers

K Hammar, R Stadler - IEEE Transactions on Network and …, 2023 - ieeexplore.ieee.org
We study automated intrusion response and formulate the interaction between an attacker
and a defender as an optimal stopping game where attack and defense strategies evolve …

Learning security strategies through game play and optimal stopping

K Hammar, R Stadler - arXiv preprint arXiv:2205.14694, 2022 - arxiv.org
We study automated intrusion prevention using reinforcement learning. Following a novel
approach, we formulate the interaction between an attacker and a defender as an optimal …

Scalable learning of intrusion response through recursive decomposition

K Hammar, R Stadler - International Conference on Decision and Game …, 2023 - Springer
We study automated intrusion response for an IT infrastructure and formulate the interaction
between an attacker and a defender as a partially observed stochastic game. To solve the …

Designing an internet traffic predictive model by applying a signal processing method

SY Ji, S Choi, DH Jeong - Journal of Network and Systems Management, 2015 - Springer
Detection of abnormal internet traffic has become a significant area of research in network
security. Due to its importance, many predictive models are designed by utilizing machine …

[PDF][PDF] Packet inter-arrival time estimation using neural network models

T Phit, K Abe - Internet Conference, Tokyo, 2006 - Citeseer
This paper presents the estimation methods of packet inter-arrival times. The approach is
based on neural network models for predicting the packet inter-arrival times by learning …

Bivariate gamma distribution: A plausible solution for joint distribution of packet arrival and their sizes

A Bhattacharjee, S Nandi - 2010 13th International Conference …, 2010 - ieeexplore.ieee.org
Network traffic has been studied extensively since new findings by Taqqu et. al.(1994),
which has shown that network traffic is not memoryless. Such traffic has been called self …

Self-similar traffic and buffer overflow: A bounded buffer allocation approach

A Bhattacharjee, S Nandi - 2009 Annual IEEE India …, 2009 - ieeexplore.ieee.org
Long range dependence (LRD) in network traffic is known for sometime. Numerous efforts
have been made to model and analyze effect of such traffic on user experience, resource …

[PDF][PDF] Using BIC and AIC for Ethernet traffic model selection. Is it worth?

A dos Santos Paschoalon, CE Rothenberg - academia.edu
In this work, we aim to evaluate how good are the information criteria AIC and BIC inferring
which is the best stochastic process to describe Ethernet inter-packet times. Also, we check if …

Mathematical Modelling of Network Traffic

Y Li - 2015 - orbilu.uni.lu
ncreasing access to the Internet is producing profound influence around the World. More
and more people are taking advantage of the Internet to obtain information, communicate …

[引用][C] 基于Pareto 分布的IP 骨干节点输入通信量模型

饶云华, 曹阳, 杨艳, 吴锐 - 计算机科学, 2006