Anomalous traffic detection in the network is one of the essential components of networksecurity protection. Neural networks are widely used in intrusion detection systems, which can learn the ability to distinguish ...
详细信息
IoT (Internet of Things) is the network of physical objects("things") in which embedded devices are used like sensors and software that are used for connecting the devices and objects over the internet. Curr...
详细信息
The most difficult task that a networks administrator faces today is to save a network from an ongoing cyber attack. Modern networks have the capability of detecting ongoing cyber attacks (i.e., using Intrusion Detect...
详细信息
ISBN:
(纸本)9798350326970
The most difficult task that a networks administrator faces today is to save a network from an ongoing cyber attack. Modern networks have the capability of detecting ongoing cyber attacks (i.e., using Intrusion Detection Systems (Ids)). Having said that, the number of false alarms tend to be high and acting upon every alarm does not necessarily make the network effective. In this paper, the contributions are-(a) established the credibility of an alarm using poisson distribution;and (b) presented a novel survivability model using the concepts of markov chains and attack graphs. The overall objective in this paper is to help network administrators to decide on whether to terminate a computer system in order to save the network (i.e., when an alarm is raised by an Ids).
This paper reviews current research trends in the formal verification of computernetwork configurations, specifically focusing on formal verification for software-defined networking (SDN). We explore the challenges e...
详细信息
ISBN:
(纸本)9789819744640;9789819744657
This paper reviews current research trends in the formal verification of computernetwork configurations, specifically focusing on formal verification for software-defined networking (SDN). We explore the challenges encountered when applying formal verification, comparing its application to pre-SDN network verification efforts. Additionally, we discuss the potential application of formal verification in mobile networks. We first provide an overview of research on the formal verification of virtual LAN (VLAN) configurations, which predates the emergence of SDN. We next illustrate SDN and existing research applying formal verification to SDN. Finally, we briefly examine potential scenarios for applying formal verification to mobile networks.
With the continuous popularization and deepening of the network, the problem of networksecurity is becoming increasingly prominent. How to detect the network intrusion behavior timely and accurately plays a very impo...
详细信息
With the continuous growth of scie & tech, network technology has been widely used, which has brought great convenience to people's life and work. However, the rapid improvement of network technology has also ...
详细信息
As software usage increases and updates, software development requires several essential elements, including industry security. As vulnerabilities are exploited, we've witnessed an upsurge in the demand for securi...
详细信息
The emergence of new network attacks, especially multi-step attacks which exhibit complex patterns, presents challenges to networksecurity. Intrusion detection in network traffic is one of the core means to ensure ne...
详细信息
ISBN:
(纸本)9798350381993;9798350382006
The emergence of new network attacks, especially multi-step attacks which exhibit complex patterns, presents challenges to networksecurity. Intrusion detection in network traffic is one of the core means to ensure network operation security. Traditional intrusion detection methods identify abnormal traffic by modeling the patterns of normal traffic. This strategy focuses on the spatial characteristics of data, ignoring the temporal characteristics of traffic evolution, and may not fully capture the patterns of multi-step network attacks. To address this problem, we propose a Temporal-Gated Graph Neural network (TGGNN) framework based on graph clustering sampling. Firstly, each network traffic data is viewed as a graph node. We use hierarchical graph clustering methods to sample representative points and further construct local evolutionary structures with their temporally adjacent nodes. Then, we design a novel way of constructing graph data that balances both local and global aspects of network traffic data. Based on the GGNN (Gated Graph Neural network), we designed a Temporal-Gated Mechanism in the information propagation part, emphasizing the learning of the local evolutionary structure of the graph. Furthermore, a bidirectional LSTM network is used to further enhance the learning of dynamic patterns in network traffic data. Experimental results based on the UNSW-NB15 dataset demonstrate that our approach not only surpasses the performance of four recent baselines but also eliminates the need for feature engineering by adopting an end-to-end approach.
This paper proposes a new firewall model to solve the problem of computernetworksecurity threats. Firstly, this paper gives the division of function modules and the working algorithm of firewall model system. Then t...
详细信息
Effectively identifying computernetwork attacks is still a challenge. This is due to recent attempts by cybercriminals to spoof intrusion detection systems (IDS) by altering packet contents. Additionally, the compute...
详细信息
暂无评论