Detecting malicious clients in ISP networks using HTTP connectivity graph and flow information

被引:0
|
作者
Liu, Lei [1 ]
Saha, Sabyasachi [3 ]
Torres, Ruben [3 ]
Xut, Jianpeng [2 ]
Tant, Pang-Ning [2 ]
Nucci, Antonio [3 ]
Mellia, Marco [4 ]
机构
[1] HP Labs., 1501 Page Mill Rd, Palo Alto,CA,95050, United States
[2] Dept. of Computer Science, Michigan State University, East Lansing,MI,48824, United States
[3] Narus Inc., 570 Maude Court, Sunnyvale,CA,94085, United States
[4] Politecnico di Torino, Italy
来源
关键词
HTTP - Web services - Flow graphs;
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
相关论文
共 50 条
  • [31] Detecting the Information of Functional Connectivity Networks in Normal Aging Using Deep Learning From a Big Data Perspective
    Wen, Xin
    Dong, Li
    Chen, Junjie
    Xiang, Jie
    Yang, Jie
    Li, Hechun
    Liu, Xiaobo
    Luo, Cheng
    Yao, Dezhong
    FRONTIERS IN NEUROSCIENCE, 2020, 13
  • [32] A Method of Detecting Abnormal Malicious Remote Control Codes using Network Domain Information
    Oh, Hyung-Geun
    Seo, Jung-Taek
    Lim, Jong In
    Moon, Jong-sub
    INFORMATION-AN INTERNATIONAL INTERDISCIPLINARY JOURNAL, 2012, 15 (05): : 2181 - 2192
  • [33] Detection and Mitigation Of Malicious Java']JavaScript Using Information Flow Control
    Sayed, Bassam
    Traore, Issa
    Abdelhalim, Amany
    2014 TWELFTH ANNUAL INTERNATIONAL CONFERENCE ON PRIVACY, SECURITY AND TRUST (PST), 2014, : 264 - 273
  • [34] Detecting review fraud using metaheuristic graph neural networks
    Oak R.
    International Journal of Information Technology, 2024, 16 (7) : 4019 - 4025
  • [35] Detecting Anomalies in Online Social Networks using Graph Metrics
    Kaur, Ravneet
    Singh, Sarbjeet
    2015 ANNUAL IEEE INDIA CONFERENCE (INDICON), 2015,
  • [36] Detecting Synthesized Audio Files Using Graph Neural Networks
    Izotova, O. A.
    Lavrova, D. S.
    AUTOMATIC CONTROL AND COMPUTER SCIENCES, 2024, 58 (08) : 1212 - 1217
  • [37] Flow completion network: Inferring the fluid dynamics from incomplete flow information using graph neural networks
    He, Xiaodong
    Wang, Yinan
    Li, Juan
    PHYSICS OF FLUIDS, 2022, 34 (08)
  • [38] Danger is ubiquitous: Detecting malicious activities in sensor networks using the dendritic cell algorithm
    Kim, Jungwon
    Bentley, Peter
    Wallenta, Christian
    Ahmed, Mohamed
    Hailes, Stephen
    ARTIFICIAL IMMUNE SYSTEMS, PROCEEDINGS, 2006, 4163 : 390 - 403
  • [39] Detecting Reentrancy Vulnerability in Smart Contracts using Graph Convolution Networks
    Lakadawala, Hozefa
    Dzigbede, Komla
    Chen, Yu
    2024 IEEE 21ST CONSUMER COMMUNICATIONS & NETWORKING CONFERENCE, CCNC, 2024, : 188 - 193
  • [40] Detecting interchanges in road networks using a graph convolutional network approach
    Yang, Min
    Jiang, Chenjun
    Yan, Xiongfeng
    Ai, Tinghua
    Cao, Minjun
    Chen, Wenyuan
    INTERNATIONAL JOURNAL OF GEOGRAPHICAL INFORMATION SCIENCE, 2022, 36 (06) : 1119 - 1139