-
1
About Detection of Code Reuse Attacks
Published 2019-06-01“…At the heart of these attacks lies the detection, in the vulnerable program of suitable areas, of executable code — gadgets — and chaining these gadgets into chains. …”
Get full text
Article -
2
Android collusion attack detection model
Published 2018-06-01“…In order to solve the problem of poor efficiency and low accuracy of Android collusion detection,an Android collusion attack model based on component communication was proposed.Firstly,the feature vector set was extracted from the known applications and the feature vector set was generated.Secondly,the security policy rule set was generated through training and classifying the privilege feature set.Then,the component communication finite state machine according to the component and communication mode feature vector set was generated,and security policy rule set was optimized.Finally,a new state machine was generated by extracting the unknown application’s feature vector set,and the optimized security policy rule set was matched to detect privilege collusion attacks.The experimental results show that the proposed model has better detective efficiency and higher accuracy.…”
Get full text
Article -
3
Network Attack Detection for Business Safety
Published 2024-03-01“…In this paper, a machine learning-based approach was developed to detect network attacks. Two Machine learning models were used: Support vector machine and Artificial neural network. …”
Get full text
Article -
4
-
5
Detecting LDoS attack based on ASPQ
Published 2012-05-01“…Based on the analysis of the effects on average size of packet in the queue which LDoS attack makes,the change of this value was got by simulation on NS2.So detection algorithm was proposed,and was applied on Droptail and RED,which were typical queue management algorithm.The result of simulation shows that the algorithm can effectively detect the LDoS attack.…”
Get full text
Article -
6
Fusion of Heterogeneous Intrusion Detection Systems for Network Attack Detection
Published 2015-01-01“…An intrusion detection system (IDS) helps to identify different types of attacks in general, and the detection rate will be higher for some specific category of attacks. …”
Get full text
Article -
7
Comprehensive Analysis of DDoS Anomaly Detection in Software-Defined Networks
Published 2025-01-01Subjects: “…Amplification attacks…”
Get full text
Article -
8
Survey of Load-Altering Attacks Against Power Grids: Attack Impact, Detection, and Mitigation
Published 2025-01-01Subjects: “…Load-altering attacks…”
Get full text
Article -
9
Cooperative Control for Multi-Agent Systems with Deception Attack Based on an Attack Detection Mechanism
Published 2025-06-01Subjects: Get full text
Article -
10
DDoS attacks detection based on link character
Published 2007-01-01“…A new method based on link character was proposed for DDoS attacks detection.Maximum likelihood estima-tion was used to estimate the distribution of link character.SOM neural network is used for link activity profile learning and anomaly link detection.Experiment results indicate that the technique is effective and of a definite practicability.It has a further develop potential for DDoS attacks detection.…”
Get full text
Article -
11
DOG: An Object Detection Adversarial Attack Method
Published 2025-01-01“…This study presents an object detection adversarial attack method (DOG) based on the dynamic optimization of a multi-scale feature grid cluster, aimed at addressing the challenges of poor transferability in white-box attacks and long generation cycles in black-box attacks within the current adversarial example generation techniques. …”
Get full text
Article -
12
Efficient attack detection and data aggregation algorithm
Published 2012-09-01Subjects: Get full text
Article -
13
Deep Learning Based DDoS Attack Detection
Published 2025-01-01“…Traditional approaches to detection, based on statistical thresholds and signature-based mechanisms, respectively, can hardly cope with the increasing complexity of such an attack. …”
Get full text
Article -
14
Incremental Adversarial Learning for Polymorphic Attack Detection
Published 2024-01-01Subjects: Get full text
Article -
15
Detecting Unusual Repetitive Patterns of Behavior Indicative of a Loop-Based Attack in IoT
Published 2024-11-01Subjects: Get full text
Article -
16
APPLYING TRANSFORMER ARCHITECTURE TO ENHANCE ATTACK DETECTION PERFORMANCE IN INTRUSION DETECTION SYSTEMS
Published 2025-06-01“…In this study, we propose a Transformer-based intrusion detection model to enhance attack recognition performance. …”
Get full text
Article -
17
Review of Recent Detection Methods for HTTP DDoS Attack
Published 2019-01-01“…This paper reviewed 12 recent detection of DDoS attack at the application layer published between January 2014 and December 2018. …”
Get full text
Article -
18
Time synchronization attack detection for industrial wireless network
Published 2023-06-01Subjects: Get full text
Article -
19
Towards automated detection of adversarial attacks on tabular data
Published 2023-09-01Get full text
Article -
20
Leveraging Graph Neural Networks for IoT Attack Detection
Published 2025-06-01“…High accuracy, precision, recall, and AUC values indicate the model's robustness in detecting attacks while minimizing false alarms. The study advances IoT security by introducing synergistic solutions and provides practical insights for implementing intrusion detection systems in real-world IoT environments.…”
Get full text
Article