An overview of IP flow-based intrusion detection

A Sperotto, G Schaffrath, R Sadre… - … surveys & tutorials, 2010 - ieeexplore.ieee.org
Intrusion detection is an important area of research. Traditionally, the approach taken to find
attacks is to inspect the contents of every packet. However, packet inspection cannot easily …

A review of detection approaches for distributed denial of service attacks

P Kaur, M Kumar, A Bhandari - Systems Science & Control …, 2017 - Taylor & Francis
ABSTRACT Distributed Denial of Service (DDoS) attacks are the intimidation trials on the
Internet that depletes the network bandwidth or exhausts the victim's resources …

The logic of coercion in cyberspace

ED Borghard, SW Lonergan - Security Studies, 2017 - Taylor & Francis
What are the dynamics of coercion in cyberspace? Can states use cyber means as
independent tools of coercion to influence the behavior of adversaries? This article critically …

A comprehensive study on APT attacks and countermeasures for future networks and communications: challenges and solutions

S Singh, PK Sharma, SY Moon, D Moon… - The Journal of …, 2019 - Springer
Recently in the connected digital world, targeted attack has become one of the most serious
threats to conventional computing systems. Advanced persistent threat (APT) is currently …

Meteor: Practical reasoning in datalog with metric temporal operators

D Wang, P Hu, PA Wałęga, BC Grau - Proceedings of the AAAI …, 2022 - ojs.aaai.org
DatalogMTL is an extension of Datalog with operators from metric temporal logic which has
received significant attention in recent years. It is a highly expressive knowledge …

Real-time network anomaly detection system using machine learning

S Zhao, M Chandrashekar, Y Lee… - 2015 11th international …, 2015 - ieeexplore.ieee.org
The ability to process, analyze, and evaluate realtime data and to identify their anomaly
patterns is in response to realized increasing demands in various networking domains, such …

[HTML][HTML] Stream reasoning with DatalogMTL

PA Wałęga, M Kaminski, D Wang, BC Grau - Journal of Web Semantics, 2023 - Elsevier
We study stream reasoning in DatalogMTL—an extension of Datalog with metric temporal
operators. We propose a sound and complete stream reasoning algorithm that is applicable …

SSHCure: a flow-based SSH intrusion detection system

L Hellemons, L Hendriks, R Hofstede… - … Networks and Services …, 2012 - Springer
SSH attacks are a main area of concern for network managers, due to the danger associated
with a successful compromise. Detecting these attacks, and possibly compromised victims …

Semantics-aware detection of targeted attacks: a survey

R Luh, S Marschalek, M Kaiser, H Janicke… - Journal of Computer …, 2017 - Springer
In today's interconnected digital world, targeted attacks have become a serious threat to
conventional computer systems and critical infrastructure alike. Many researchers contribute …

[HTML][HTML] Detection of attack-targeted scans from the Apache HTTP Server access logs

MB Seyyar, FÖ Çatak, E Gül - Applied computing and informatics, 2018 - Elsevier
A web application could be visited for different purposes. It is possible for a web site to be
visited by a regular user as a normal (natural) visit, to be viewed by crawlers, bots, spiders …