Use neural network algorithms to securely detect HTTP traffic
نویسندگان
چکیده
منابع مشابه
Analyzing Network Traffic To Detect Self-Decrypting
Remotely-launched software exploits are a common way for attackers to intrude into vulnerable computer systems. As detection techniques improve, remote exploitation techniques are also evolving. Recent techniques for evasion of exploit detection include polymorphism (code encryption) and metamorphism (code obfuscation). This paper addresses the problem of detecting in network traffic polymorphi...
متن کاملAn Empirical Model of HTTP Network Traffic
Bruce A. Mah [email protected] The Tenet Group Computer Science Division University of California at Berkeley Berkeley, CA 94720-1776 The workload of the global Internet is dominated by the Hypertext Transfer Protocol (HTTP), an application protocol used by World Wide Web clients and servers. Simulation studies of IP networks will require a model of the traSJic putterns of the World Wide Web...
متن کاملNeural Response to Distress Among Securely Attached 1 Running Head: NEURAL RESPONSE TO DISTRESS AMONG SECURELY ATTACHED Muted Neural Response to Distress Among Securely Attached People
Neural processes that support individual differences in attachment security and affect regulation are currently unclear (Coan, 2010). Using EEG, we examined whether securely attached individuals, compared to insecure individuals, would show a muted neural response to experimentally manipulated distress. Participants completed a reaction time task that elicits error commission and the error-rela...
متن کاملNeural Network VS. Bayesian Network to Detect Java Card Mutants
Being a vital element for the different domains such as communication system, authentication, and payment, multiple attackers manipulate the Card fraudulently in order to access to the services offered by this one. Smartcards are often the target of software and hardware attacks. The most recent attacks are based on fault injection which modifies the application behavior. By disrupting the Java...
متن کاملAn Imunogenetic Technique To Detect Anomalies In Network Traffic
The paper describes an immunogenetic approach which can detect a wide variety of intrusive activities on networked computers. In particular, this technique is inspired by the negative selection mechanism of the immune system that can detect foreign patterns in the complement (nonself) space. The novel pattern detectors (in the complement space) are evolved using a genetic search, which could di...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Journal of Physics: Conference Series
سال: 2021
ISSN: 1742-6588,1742-6596
DOI: 10.1088/1742-6596/1748/3/032049