Detecting malicious clients in ISP networks using HTTP connectivity graph and flow information

被引:0
|
作者
Liu, Lei [1 ]
Saha, Sabyasachi [3 ]
Torres, Ruben [3 ]
Xut, Jianpeng [2 ]
Tant, Pang-Ning [2 ]
Nucci, Antonio [3 ]
Mellia, Marco [4 ]
机构
[1] HP Labs., 1501 Page Mill Rd, Palo Alto,CA,95050, United States
[2] Dept. of Computer Science, Michigan State University, East Lansing,MI,48824, United States
[3] Narus Inc., 570 Maude Court, Sunnyvale,CA,94085, United States
[4] Politecnico di Torino, Italy
来源
关键词
HTTP - Web services - Flow graphs;
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
相关论文
共 50 条
  • [1] Detecting Malicious Clients in ISP Networks Using HTTP Connectivity Graph and Flow Information
    Liu, Lei
    Saha, Sabyasachi
    Torres, Ruben
    Xu, Jianpeng
    Tan, Pang-Ning
    Nucci, Antonio
    Mellia, Marco
    2014 PROCEEDINGS OF THE IEEE/ACM INTERNATIONAL CONFERENCE ON ADVANCES IN SOCIAL NETWORKS ANALYSIS AND MINING (ASONAM 2014), 2014, : 150 - 157
  • [2] Detecting Malicious Blockchain Transactions Using Graph Neural Networks
    Jeyakumar, Samantha Tharani
    Yugarajah, Andrew Charles Eugene
    Hou, Zhe
    Muthukkumarasamy, Vallipuram
    DISTRIBUTED LEDGER TECHNOLOGY, SDLT 2023, 2024, 1975 : 55 - 71
  • [3] A Method of Detecting a Malicious Actions using HTTP and FTP Protocols
    Silnov, D. S.
    Prokofiev, A. O.
    Berezovskaya, G.
    Perevozchikov, V. A.
    Troitskiy, S. S.
    Shumakov, I. U.
    PROCEEDINGS OF THE 2017 INTELLIGENT SYSTEMS CONFERENCE (INTELLISYS), 2017, : 1083 - 1088
  • [4] Detecting Malicious HTTP Redirections Using Trees of User Browsing Activity
    Mekky, Hesham
    Torrest, Ruben
    Zhang, Zhi-Li
    Saha, Sabyasachi
    Nucci, Antonio
    2014 PROCEEDINGS IEEE INFOCOM, 2014, : 1159 - 1167
  • [5] Detecting wormhole attacks in wireless networks using connectivity information
    Maheshwari, Ritesh
    Gao, Jie
    Das, Samir R.
    INFOCOM 2007, VOLS 1-5, 2007, : 107 - +
  • [6] NESTEDGNN: Detecting Malicious Network Activity with Nested Graph Neural Networks
    Ji, Yuede
    Huang, H. Howie
    IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC 2022), 2022, : 2694 - 2699
  • [7] Detecting Malicious HTTP Requests Without Log Parser Using RequestBERT-BiLSTM
    Ramos Junior, Levi S.
    Macedo, David
    Oliveira, Adriano L., I
    Zanchettin, Cleber
    INTELLIGENT SYSTEMS, PT II, 2022, 13654 : 328 - 342
  • [8] Detecting Malicious Logins in Enterprise Networks Using Visualization
    Siadati, Hossein
    Saket, Bahador
    Memon, Nasir
    2016 IEEE SYMPOSIUM ON VISUALIZATION FOR CYBER SECURITY (VIZSEC), 2016,
  • [9] Detecting Malicious Roadside Units in Vehicular Social Networks for Information Service
    Mao, Ming
    Yi, Peng
    Zhang, Jianhui
    Pei, Jinchuan
    WIRELESS PERSONAL COMMUNICATIONS, 2023, 130 (04) : 2565 - 2588
  • [10] De-cloaking Malicious Activities in Smartphones Using HTTP Flow Mining
    Su, Xin
    Liu, Xuchong
    Lin, Jiuchuang
    He, Shiming
    Fu, Zhangjie
    Li, Wenjia
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2017, 11 (06): : 3230 - 3253