2015
DOI: 10.14257/ijsia.2015.9.4.08
|View full text |Cite
|
Sign up to set email alerts
|

A Hybrid Mitigation Technique for Malicious Network Traffic based on Active Response

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
11
0

Year Published

2017
2017
2022
2022

Publication Types

Select...
4
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(11 citation statements)
references
References 19 publications
0
11
0
Order By: Relevance
“…Next, we will present the findings and analysis of the research questions. Watering hole [3,28,79,84,88,99,101,102] Malware [1,3,88,89,[102][103][104][105] Application repackaging [106] Attacks on an Internet-facing server [3,83,89,101] Removable device [3,89,107] Drive-by download [96] Spoofing attack [7,82,108] SQL injection Execution [3,5,82,84,[86][87][88]90,94,97,101,[109][110][111][112][113][114] Zero day, known vulnerability [79,101,115] Remote code execution/Code injection ...…”
Section: Analysis and Findings Of Research Questionsmentioning
confidence: 99%
See 2 more Smart Citations
“…Next, we will present the findings and analysis of the research questions. Watering hole [3,28,79,84,88,99,101,102] Malware [1,3,88,89,[102][103][104][105] Application repackaging [106] Attacks on an Internet-facing server [3,83,89,101] Removable device [3,89,107] Drive-by download [96] Spoofing attack [7,82,108] SQL injection Execution [3,5,82,84,[86][87][88]90,94,97,101,[109][110][111][112][113][114] Zero day, known vulnerability [79,101,115] Remote code execution/Code injection ...…”
Section: Analysis and Findings Of Research Questionsmentioning
confidence: 99%
“…Malware-Malicious software such as spyware, Trojans, and bots are used to carry out unauthorized operations on a targeted system in order to steal information or disrupt the system [87,116,121,144,[172][173][174]; 5.…”
Section: Initial Accessmentioning
confidence: 99%
See 1 more Smart Citation
“…A deep presentation-learning arrangement has also been developed for chance management employing a single symmetric presentation from the asymmetric dataset. The correctness of models was determined to be 91.62 percent [18]. As a solution to this difficulty, an enhanced and effective adversary version will be provided.…”
Section: Proposed Model For Cyber-attack Detection and Mitigation Systemmentioning
confidence: 99%
“…al. [22] discusses both misuses and anomaly detection methods while discovering a new cross technique by combining the ideas of J48, Boyer Moore and K-NN algorithms so that it detects the intrusions better, this algorithm is HYBRITQ-4.…”
Section: Literature Surveymentioning
confidence: 99%