2018
DOI: 10.1051/shsconf/20184400052
|View full text |Cite
|
Sign up to set email alerts
|

Wavelet-analysis of network traffic time-series for detection of attacks on digital production infrastructure

Abstract: Digital production integrates with all the areas of human activity including critical industries, therefore the task of detecting network attacks has a key priority in protecting digital manufacture systems. This article offers an approach for analysis of digital production security based on evaluation of a posteriori probability for change point in time-series, which are based on the change point coefficient values of digital wavelet-transform in the network traffic time-series. These time-series make it poss… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
5
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 9 publications
(5 citation statements)
references
References 5 publications
0
5
0
Order By: Relevance
“…Additionally, the researchers in [12] analyzed the CICIDS2017 dataset using digital wavelets. Their method efficiently detected service denial attacks of both Slow Loris and HTTP Denial of Service (DoS).…”
Section: Cicids2017 Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Additionally, the researchers in [12] analyzed the CICIDS2017 dataset using digital wavelets. Their method efficiently detected service denial attacks of both Slow Loris and HTTP Denial of Service (DoS).…”
Section: Cicids2017 Related Workmentioning
confidence: 99%
“…(1) False Alarm Rate (FAR) is a common term which encompasses the number of normal instances incorrectly classified by the classifier as an attack, and can be estimated through Equation (12).…”
Section: Performance Evaluation Metricsmentioning
confidence: 99%
“…Researchers in [12] tested the conference dataset with the aid of digital wavelets. Their approach guarantees the detection and avoidance of denial-of-service attacks of both Slow Loris and HTTP Denial of Service (DoS).…”
Section: A Cicids2017mentioning
confidence: 99%
“…To overcome the mentioned obstacles, the security researchers and IDS developers are focused on the advanced ML methods for the intrusion detection (e.g., [8][9][10][11]). For instance, the extra-deep neural networks with billions of weights running on the supercomputer are able to identify complex and subtle patterns at a big dataset of attack signs.…”
Section: Introductionmentioning
confidence: 99%