Enterprise Network Infrastructure Malicious Activity Analysis
نویسندگان
چکیده
Inter and intra-network connectivity have become a useful resource for accessibility flexibility of data different organizations. Online services are increasing day by day, everything is available online, it generates huge amount data, that require cyber security ensuring secure interconnectivity between devices. Because an exponential increase in internet users cyber-attacks, the credibility various organizations on stake. In continued development threat environment, experts deal with numerous son daily basis. As multiple attacks computer networks systems becoming stronger each therefore current tools often inadequate to resolve issues relating unauthorized users, reliability, reliable network security. To maintain safe Intrusion-Detection Mechanisms (IDS) enabled control device functions detect intrusions should typically be used supplement other protection strategies; which conventional methods inadequate. Actual expect their requested information processed real-time, while malicious traffic needs mitigated just as quickly possible. increases, this problem becomes more complex. This paper contributes detailed analysis packets find anomaly detection based UNSW NB 15 dataset investigate difference IP packet behavior both legitimate packets. Besides we acquaint new methodologies illuminate appraise attack very proficient way using machine learning algorithms will accomplish locating least execution time precision
منابع مشابه
Classification of Malicious Network Activity
As more and more vital services today (e.g. email, Facebook, quantitative trading) depend on machine learning algorithms, there is a greater incentive than ever for adversaries to manipulate these algorithms for malicious ends (e.g. spam, identity theft, cyberattacks). The field of adversarial learning has arisen out of a need to design learning algorithms that are robust to these sort of disru...
متن کاملMalSpot: Multi2 Malicious Network Behavior Patterns Analysis
What are the patterns that typical network attackers exhibit? For a given malicious network behaviors, are its attacks spread uniformly over time? In this work, we develop MalSpot, multi-resolution and multi-linear (Multi) network analysis system in order to discover such malicious patterns, so that we can use them later for attack detection, when attacks are concurrent with legitimate traffic....
متن کاملBuilding Enterprise Network Infrastructure for a Supermarket Store Chain
Enterprise network infrastructure has served as a vehicle on which data and information can be transferred between functional units regardless of their location. Creating the network infrastructure that enables firms and organizations to adapt to rapidly changing business needs has never been more important than now. Building the enterprise network infrastructure requires careful planning, effe...
متن کاملReal-time detection of malicious network activity using stochastic models
This dissertation develops approaches to rapidly detect malicious network traffic including packets sent by portscanners and network worms. The main hypothesis is that stochastic models capturing a host’s particular connection-level behavior provide a good foundation for identifying malicious network activity in real-time. Using the models, the dissertation shows that a detection problem can be...
متن کاملanalysis of power in the network society
اندیشمندان و صاحب نظران علوم اجتماعی بر این باورند که مرحله تازه ای در تاریخ جوامع بشری اغاز شده است. ویژگیهای این جامعه نو را می توان پدیده هایی از جمله اقتصاد اطلاعاتی جهانی ، هندسه متغیر شبکه ای، فرهنگ مجاز واقعی ، توسعه حیرت انگیز فناوری های دیجیتال، خدمات پیوسته و نیز فشردگی زمان و مکان برشمرد. از سوی دیگر قدرت به عنوان موضوع اصلی علم سیاست جایگاه مهمی در روابط انسانی دارد، قدرت و بازتولید...
15 صفحه اولذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International journal of innovations in science and technology
سال: 2022
ISSN: ['2618-1630']
DOI: https://doi.org/10.33411/ijist/2022040404