Cargando…

Utilising Flow Aggregation to Classify Benign Imitating Attacks

Cyber-attacks continue to grow, both in terms of volume and sophistication. This is aided by an increase in available computational power, expanding attack surfaces, and advancements in the human understanding of how to make attacks undetectable. Unsurprisingly, machine learning is utilised to defen...

Descripción completa

Detalles Bibliográficos
Autores principales: Hindy, Hanan, Atkinson, Robert, Tachtatzis, Christos, Bayne, Ethan, Bures, Miroslav, Bellekens, Xavier
Formato: Online Artículo Texto
Lenguaje:English
Publicado: MDPI 2021
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7961933/
https://www.ncbi.nlm.nih.gov/pubmed/33806363
http://dx.doi.org/10.3390/s21051761