Abnormal behavior detection of enterprise entities using time-series data

PK Manadhata, SN Bhatt, T Sander - US Patent 11,310,247, 2022‏ - Google Patents
A machine-readable medium may store instructions execut able by a processing resource to
access log data of an enterprise and extract time-series data of an enterprise entity from the …

Detection of dns ddos attacks with random forest algorithm on spark

L Chen, Y Zhang, Q Zhao, G Geng, ZW Yan - Procedia computer science, 2018‏ - Elsevier
Abstract Domain Name System (DNS) is one of the most foundational and essential services
on the Internet, the security and robustness of DNS are of great significance. However, the …

Detection of phishing websites using a novel twofold ensemble model

K Nagaraj, B Bhattacharjee, A Sridhar… - Journal of Systems and …, 2018‏ - emerald.com
Purpose Phishing is one of the major threats affecting businesses worldwide in current
times. Organizations and customers face the hazards arising out of phishing attacks …

Learning semantic information from Internet Domain Names using word embeddings

W Lopez, J Merlino, P Rodriguez-Bocca - Engineering Applications of …, 2020‏ - Elsevier
Word embeddings is a well-known set of techniques widely used in Natural Language
Processing (NLP). These techniques are able to learn words' semantic based on the …

Statistical models for the number of successful cyber intrusions

NO Leslie, RE Harang, LP Knachel… - The Journal of Defense …, 2018‏ - journals.sagepub.com
We propose several generalized linear models (GLMs) to predict the number of successful
cyber intrusions (or “intrusions”) into an organization's computer network, where the rate at …

A cause-based classification approach for malicious DNS queries detected through blacklists

A Satoh, Y Nakamura, Y Fukuda, K Sasai… - IEEE …, 2019‏ - ieeexplore.ieee.org
Some of the most serious security threats facing computer networks involve malware. To
prevent this threat, administrators need to swiftly remove the infected machines from their …

NetMiner: Identifying Failure-Inducing Patterns in the Logs Generated by Network Monitoring Software

GR Sathi, L Vedullapalli, MH Kishan… - 2023 14th …, 2023‏ - ieeexplore.ieee.org
To ensure uninterrupted network communication among multiple sources, the network
administrator needs to do real-time monitoring of network logs. Due to its huge volume and …

Vector representation of internet domain names using a word embedding technique

W Lopez, J Merlino… - 2017 XLIII Latin American …, 2017‏ - ieeexplore.ieee.org
Word embeddings is a well known set of techniques widely used in natural language
processing (NLP), and word2vec is a computationally-efficient predictive model to learn …

Association rules and frequent patterns

G Di Fatta - 2019‏ - books.google.com
Association Rule Mining (ARM)(Agrawal et al., 1993; Agrawal and Srikant, 1994; Hipp et al.,
2000) is often referred to as frequent pattern mining (Goethals, 2003; Han et al., 2007; …

Blockchain Smart Contract Virtual Machine Optimization Technology for Domain Name Systems

S Wang, K Wang, L Jia, L Yu, Z Li… - 2021 IEEE …, 2021‏ - ieeexplore.ieee.org
The existing domain name system relies heavily on the root domain name server and has
unilateral management problems, which is not conducive to the open and equal …