Use neural network algorithms to securely detect HTTP traffic

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Analyzing Network Traffic To Detect Self-Decrypting

Remotely-launched software exploits are a common way for attackers to intrude into vulnerable computer systems. As detection techniques improve, remote exploitation techniques are also evolving. Recent techniques for evasion of exploit detection include polymorphism (code encryption) and metamorphism (code obfuscation). This paper addresses the problem of detecting in network traffic polymorphi...

متن کامل

An Empirical Model of HTTP Network Traffic

Bruce A. Mah [email protected] The Tenet Group Computer Science Division University of California at Berkeley Berkeley, CA 94720-1776 The workload of the global Internet is dominated by the Hypertext Transfer Protocol (HTTP), an application protocol used by World Wide Web clients and servers. Simulation studies of IP networks will require a model of the traSJic putterns of the World Wide Web...

متن کامل

Neural Response to Distress Among Securely Attached 1 Running Head: NEURAL RESPONSE TO DISTRESS AMONG SECURELY ATTACHED Muted Neural Response to Distress Among Securely Attached People

Neural processes that support individual differences in attachment security and affect regulation are currently unclear (Coan, 2010). Using EEG, we examined whether securely attached individuals, compared to insecure individuals, would show a muted neural response to experimentally manipulated distress. Participants completed a reaction time task that elicits error commission and the error-rela...

متن کامل

Neural Network VS. Bayesian Network to Detect Java Card Mutants

Being a vital element for the different domains such as communication system, authentication, and payment, multiple attackers manipulate the Card fraudulently in order to access to the services offered by this one. Smartcards are often the target of software and hardware attacks. The most recent attacks are based on fault injection which modifies the application behavior. By disrupting the Java...

متن کامل

An Imunogenetic Technique To Detect Anomalies In Network Traffic

The paper describes an immunogenetic approach which can detect a wide variety of intrusive activities on networked computers. In particular, this technique is inspired by the negative selection mechanism of the immune system that can detect foreign patterns in the complement (nonself) space. The novel pattern detectors (in the complement space) are evolved using a genetic search, which could di...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Journal of Physics: Conference Series

سال: 2021

ISSN: 1742-6588,1742-6596

DOI: 10.1088/1742-6596/1748/3/032049