2013 IEEE International Conference on Acoustics, Speech and Signal Processing 2013
DOI: 10.1109/icassp.2013.6638196
|View full text |Cite
|
Sign up to set email alerts
|

Probabilistic threat propagation for malicious activity detection

Abstract: In this paper, we present a method for detecting malicious activity within networks of interest. We leverage prior community detection work by propagating threat probabilities across graph nodes, given an initial set of known malicious nodes. We enhance prior work by employing constraints which remove the adverse effect of cyclic propagation that is a byproduct of current methods. We demonstrate the effectiveness of Probabilistic Threat Propagation on the task of detecting malicious web destinations.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2014
2014
2024
2024

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 7 publications
(1 citation statement)
references
References 13 publications
0
1
0
Order By: Relevance
“…Traditional single bots usually execute their tasks at a rate much higher than average human users to achieve their goal within a time limit. Recent single-bot detection methods, like peak-finding [2], outlier detection [3], threat propagation [4], more or less use this property of single bots.…”
Section: Introductionmentioning
confidence: 99%
“…Traditional single bots usually execute their tasks at a rate much higher than average human users to achieve their goal within a time limit. Recent single-bot detection methods, like peak-finding [2], outlier detection [3], threat propagation [4], more or less use this property of single bots.…”
Section: Introductionmentioning
confidence: 99%