Search alternatives:
networks » network (Expand Search)
Showing 161 - 180 results of 836 for search 'Computer networks Security features.', query time: 0.07s Refine Results
  1. 161
  2. 162
  3. 163

    Approach of detecting low-rate DoS attack based on combined features by Zhi-jun WU, Jing-an ZHANG, Meng YUE, Cai-feng ZHANG

    Published 2017-05-01
    “…LDoS (low-rate denial of service) attack is a kind of RoQ (reduction of quality) attack which has the characteristics of low average rate and strong concealment.These characteristics pose great threats to the security of cloud computing platform and big data center.Based on network traffic analysis,three intrinsic characteristics of LDoS attack flow were extracted to be a set of input to BP neural network,which is a classifier for LDoS attack detection.Hence,an approach of detecting LDoS attacks was proposed based on novel combined feature value.The proposed approach can speedily and accurately model the LDoS attack flows by the efficient self-organizing learning process of BP neural network,in which a proper decision-making indicator is set to detect LDoS attack in accuracy at the end of output.The proposed detection approach was tested in NS2 platform and verified in test-bed network environment by using the Linux TCP-kernel source code,which is a widely accepted LDoS attack generation tool.The detection probability derived from hypothesis testing is 96.68%.Compared with available researches,analysis results show that the performance of combined features detection is better than that of single feature,and has high computational efficiency.…”
    Get full text
    Article
  4. 164
  5. 165
  6. 166

    EfficientTransformer: A Dynamic Anomaly Detection Model for Industrial Control Networks by Jinyang Liu, Guogang Wang, Xuejun Zong, Bowei Ning, Kan He

    Published 2025-01-01
    “…As industrial control network threats become increasingly complex, traditional intrusion detection systems (IDS) struggle to capture implicit relationships due to feature redundancy and intricate feature interactions. …”
    Get full text
    Article
  7. 167
  8. 168
  9. 169
  10. 170
  11. 171
  12. 172
  13. 173
  14. 174
  15. 175
  16. 176
  17. 177
  18. 178
  19. 179
  20. 180

    Enhanced anomaly traffic detection framework using BiGAN and contrastive learning by Haoran Yu, Wenchuan Yang, Baojiang Cui, Runqi Sui, Xuedong Wu

    Published 2024-11-01
    “…Abstract Abnormal traffic detection is a crucial topic in the field of network security. However, existing methods face many challenges when processing complex high-dimensional traffic data. …”
    Get full text
    Article