Showing 1 - 20 results of 2,381 for search 'detection attacks', query time: 0.11s Refine Results
  1. 1

    About Detection of Code Reuse Attacks by Yury V. Kosolapov

    Published 2019-06-01
    “…At the heart of these attacks lies the detection, in the vulnerable program of suitable areas, of executable code — gadgets — and chaining these gadgets into chains. …”
    Get full text
    Article
  2. 2

    Android collusion attack detection model by Hongyu YANG, Zaiming WANG

    Published 2018-06-01
    “…In order to solve the problem of poor efficiency and low accuracy of Android collusion detection,an Android collusion attack model based on component communication was proposed.Firstly,the feature vector set was extracted from the known applications and the feature vector set was generated.Secondly,the security policy rule set was generated through training and classifying the privilege feature set.Then,the component communication finite state machine according to the component and communication mode feature vector set was generated,and security policy rule set was optimized.Finally,a new state machine was generated by extracting the unknown application’s feature vector set,and the optimized security policy rule set was matched to detect privilege collusion attacks.The experimental results show that the proposed model has better detective efficiency and higher accuracy.…”
    Get full text
    Article
  3. 3

    Network Attack Detection for Business Safety by Fadia Abduljabbar Saeed, Ghalia Nassreddine, Joumana Younis

    Published 2024-03-01
    “…In this paper, a machine learning-based approach was developed to detect network attacks. Two Machine learning models were used: Support vector machine and Artificial neural network. …”
    Get full text
    Article
  4. 4
  5. 5

    Detecting LDoS attack based on ASPQ by Jing ZHANG, Hua-ping HU, Bo LIU, Feng-tao XIAO

    Published 2012-05-01
    “…Based on the analysis of the effects on average size of packet in the queue which LDoS attack makes,the change of this value was got by simulation on NS2.So detection algorithm was proposed,and was applied on Droptail and RED,which were typical queue management algorithm.The result of simulation shows that the algorithm can effectively detect the LDoS attack.…”
    Get full text
    Article
  6. 6

    Fusion of Heterogeneous Intrusion Detection Systems for Network Attack Detection by Jayakumar Kaliappan, Revathi Thiagarajan, Karpagam Sundararajan

    Published 2015-01-01
    “…An intrusion detection system (IDS) helps to identify different types of attacks in general, and the detection rate will be higher for some specific category of attacks. …”
    Get full text
    Article
  7. 7
  8. 8
  9. 9
  10. 10

    DDoS attacks detection based on link character by SUN Hong-jie, FANG Bin-xing, ZHANG Hong-li

    Published 2007-01-01
    “…A new method based on link character was proposed for DDoS attacks detection.Maximum likelihood estima-tion was used to estimate the distribution of link character.SOM neural network is used for link activity profile learning and anomaly link detection.Experiment results indicate that the technique is effective and of a definite practicability.It has a further develop potential for DDoS attacks detection.…”
    Get full text
    Article
  11. 11

    DOG: An Object Detection Adversarial Attack Method by Jinpeng Li, Xiaoyu Ji, Wenyuan Xu, Yushi Cheng

    Published 2025-01-01
    “…This study presents an object detection adversarial attack method (DOG) based on the dynamic optimization of a multi-scale feature grid cluster, aimed at addressing the challenges of poor transferability in white-box attacks and long generation cycles in black-box attacks within the current adversarial example generation techniques. …”
    Get full text
    Article
  12. 12
  13. 13

    Deep Learning Based DDoS Attack Detection by Xu Ziyi

    Published 2025-01-01
    “…Traditional approaches to detection, based on statistical thresholds and signature-based mechanisms, respectively, can hardly cope with the increasing complexity of such an attack. …”
    Get full text
    Article
  14. 14
  15. 15
  16. 16

    APPLYING TRANSFORMER ARCHITECTURE TO ENHANCE ATTACK DETECTION PERFORMANCE IN INTRUSION DETECTION SYSTEMS by Vu Thi Phuong*, Hoang Thi Hong Ha, Dinh Gia Truong, Tran Thi Yen

    Published 2025-06-01
    “…In this study, we propose a Transformer-based intrusion detection model to enhance attack recognition performance. …”
    Get full text
    Article
  17. 17

    Review of Recent Detection Methods for HTTP DDoS Attack by Ghafar A. Jaafar, Shahidan M. Abdullah, Saifuladli Ismail

    Published 2019-01-01
    “…This paper reviewed 12 recent detection of DDoS attack at the application layer published between January 2014 and December 2018. …”
    Get full text
    Article
  18. 18
  19. 19
  20. 20

    Leveraging Graph Neural Networks for IoT Attack Detection by Mevlüt Uysal, Erdal Özdoğan, Onur Ceran

    Published 2025-06-01
    “…High accuracy, precision, recall, and AUC values indicate the model's robustness in detecting attacks while minimizing false alarms. The study advances IoT security by introducing synergistic solutions and provides practical insights for implementing intrusion detection systems in real-world IoT environments.…”
    Get full text
    Article