MFFusion: A multi-level features fusion model for malicious traffic detection based on deep learning

K Lin, X Xu, F **ao - Computer Networks, 2022 - Elsevier
Network malicious traffic detection is one of the essential tasks of computer networks, which
has become an obstacle to network development as networks are expanding in size and …

A deep learning method to detect network intrusion through flow‐based features

A Pektaş, T Acarman - International Journal of Network …, 2019 - Wiley Online Library
In this paper, we present a deep neural network model to enhance the intrusion detection
performance. A deep learning architecture combining convolution neural network and long …

Artificial immune systems and fuzzy logic to detect flooding attacks in software-defined networks

GF Scaranti, LF Carvalho, S Barbon… - IEEE Access, 2020 - ieeexplore.ieee.org
Software-defined Networking (SDN) has been discovered as an architecture that uses
applications to make networks flexible and centrally controlled. Although SDN provides …

Anomaly detection using the correlational paraconsistent machine with digital signatures of network segment

EHM Pena, LF Carvalho, S Barbon Jr… - Information …, 2017 - Elsevier
This study presents the correlational paraconsistent machine (CPM), a tool for anomaly
detection that incorporates unsupervised models for traffic characterization and principles of …

Online traffic prediction in the cloud

BL Dalmazo, JP Vilela, M Curado - International Journal of …, 2016 - Wiley Online Library
Network traffic prediction is a fundamental tool to harness several management tasks, such
as monitoring and managing network traffic. Online traffic prediction is usually performed …

ACO and GA metaheuristics for anomaly detection

AH Hamamoto, LF Carvalho… - 2015 34th international …, 2015 - ieeexplore.ieee.org
Computer networks have become an essential technology to society, providing information
and services to its users. Due to its importance, network management is necessary to …

Host behavior in computer network: One-year study

T Jirsik, P Velan - IEEE Transactions on Network and Service …, 2020 - ieeexplore.ieee.org
An analysis of a host behavior is an essential key for modern network management and
security. A robust behavior profile enables the network managers to detect anomalies with …

Performance analysis of weather's impact on outdoor IEEE 802.11 b/g links using network management parameters

D Bri, M Garcia-Pineda, J Lloret, F Ramos - Mobile Networks and …, 2016 - Springer
Some previous works concluded that weather conditions impact on the performance of
outdoor IEEE 802.11 b/g links. They show high correlation coefficients between the number …

[PDF][PDF] Detecçao de anomalias em redes de computadores utilizando Redes Adversárias Generativas

VG da Silva Ruffo, MLP Jr - GAN - sites.uel.br
In the past few years, many tasks performed by human beings have been eased or
automatized by computer networks. Those systems provide high value to society, and as a …

[PDF][PDF] Um ecossistema para detecção e mitigação de anomalias em redes definidas por software

LF Carvalho - 2018 - repositorio.unicamp.br
A massificação dos recursos computacionais e o aumento das taxas de transmissão das
redes de comunicação têm contribuído para o surgimento de serviços cada vez mais …