2021
DOI: 10.11591/ijece.v11i2.pp1666-1674
|View full text |Cite
|
Sign up to set email alerts
|

A hybrid method of genetic algorithm and support vector machine for DNS tunneling detection

Abstract: With the expansion of the business over the internet, corporations nowadays are investing numerous amounts of money in the web applications. However, there are different threats could make the corporations vulnerable for potential attacks. One of these threats is harnessing the domain name protocol for passing harmful information, this kind of threats is known as DNS tunneling. As a result, confidential information would be exposed and violated. Several studies have investigated the machine learning in order t… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(1 citation statement)
references
References 16 publications
0
1
0
Order By: Relevance
“…However, current techniques for detecting attacks in network systems, particularly those that depend on periodic models and extensive training data, resulting in challenges in achieving effective intrusion detection. Then, need to develop a system that can accurately classify real-time data and assess its effectiveness in achieving consistently high accuracy rates [17], [18]. The study of network intrusion detection is essential to support cybersecurity defenses.…”
Section: Introductionmentioning
confidence: 99%
“…However, current techniques for detecting attacks in network systems, particularly those that depend on periodic models and extensive training data, resulting in challenges in achieving effective intrusion detection. Then, need to develop a system that can accurately classify real-time data and assess its effectiveness in achieving consistently high accuracy rates [17], [18]. The study of network intrusion detection is essential to support cybersecurity defenses.…”
Section: Introductionmentioning
confidence: 99%