Cyber Attack Detection with Encrypted Network Connection Analysis

被引:0
|
作者
Gonen, Serkan [1 ]
Karacayilmaz, Gokce [2 ]
Artuner, Harun [3 ]
Bariskan, Mehmet Ali [4 ]
Yilmaz, Ercan Nurcan [5 ]
机构
[1] Software Engineering Department, Istanbul Gelisim University, Istanbul, Turkey
[2] Hacettepe University Institute of Science, Ankara, Turkey
[3] Computer Engineering Department, Hacattepe University, Ankara, Turkey
[4] Computer Engineering Department, Istanbul Gelisim University, Istanbul, Turkey
[5] Electrical – Electronic Engineering Department, Gazi University, Ankara, Turkey
关键词
Compendex;
D O I
暂无
中图分类号
学科分类号
摘要
Cybersecurity
引用
收藏
页码:622 / 629
相关论文
共 50 条
  • [21] survey of Cyber Attack Detection Strategies
    Raiyn, Jamal
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2014, 8 (01): : 247 - 255
  • [22] Experimental Cyber Attack Detection Framework
    Mironeanu, Catalin
    Archip, Alexandru
    Amarandei, Cristian-Mihai
    Craus, Mitica
    ELECTRONICS, 2021, 10 (14)
  • [23] A Survey of Cyber Attack Detection Systems
    Singh, Shailendra
    Silakari, Sanjay
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2009, 9 (05): : 1 - 10
  • [24] Cyber Attack Detection and Prediction System
    Siva, O. Venkata
    Neeraja, Karanki
    Kalyan, Dondapati
    Naga, Kandula Siva
    2024 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATION AND APPLIED INFORMATICS, ACCAI 2024, 2024,
  • [25] Network Attack Detection based on Domain Attack Behavior Analysis
    Wang, Weifeng
    Zhang, Xinyu
    Dong, Likai
    Fan, Yuling
    Diao, Xinyi
    Xu, Tao
    2020 13TH INTERNATIONAL CONGRESS ON IMAGE AND SIGNAL PROCESSING, BIOMEDICAL ENGINEERING AND INFORMATICS (CISP-BMEI 2020), 2020, : 962 - 965
  • [26] Discovering Collaborative Cyber Attack Patterns Using Social Network Analysis
    Du, Haitao
    Yang, Shanchieh Jay
    SOCIAL COMPUTING, BEHAVIORAL-CULTURAL MODELING AND PREDICTION, 2011, 6589 : 129 - 136
  • [27] Analysis of Cyber Attack Traceback Techniques from the Perspective of Network Forensics
    Liu X.-H.
    Ding L.-P.
    Zheng T.
    Wu J.-Z.
    Li Y.-F.
    Ruan Jian Xue Bao/Journal of Software, 2021, 32 (01): : 194 - 217
  • [28] Analysis of Cyber Attack Vectors
    Tiwari, Vijay K.
    Dwivedi, Rajeeva
    2016 IEEE INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND AUTOMATION (ICCCA), 2016, : 600 - 604
  • [29] Fault Detection and Isolation of Cyber-Physical System under Cyber-Attack Using Bayesian Network
    Tanwar, Monika
    Raghavan, Nagarajan
    Dammala, Pradeep K.
    2024 IEEE INTERNATIONAL CONFERENCE ON PROGNOSTICS AND HEALTH MANAGEMENT, ICPHM 2024, 2024, : 84 - 92
  • [30] Application of Artificial Neural Network for Cyber-Attack Detection in Water Distribution Systems as Cyber Physical Systems
    Min, Kyoung Won
    Choi, Young Hwan
    Al-Shamiri, Abobakr Khalil
    Kim, Joong Hoon
    ADVANCES IN HARMONY SEARCH, SOFT COMPUTING AND APPLICATIONS, 2020, 1063 : 82 - 88