2018
DOI: 10.2197/ipsjjip.26.804
|View full text |Cite
|
Sign up to set email alerts
|

Leaving All Proxy Server Logs to Paragraph Vector

Abstract: Cyberattack techniques continue to evolve every day. Detecting unseen drive-by-download attacks or C&C traffic is a challenging task. Pattern-matching-based techniques and using malicious blacklists are not efficient anymore, because attackers easily change the traffic pattern or infrastructure to avoid detection. Therefore, many behaviorbased detection methods have been proposed, which use the immutable characteristic of the traffic. These previous methods, however, focus on the attack technique, and can only… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
14
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
5
1

Relationship

3
3

Authors

Journals

citations
Cited by 9 publications
(14 citation statements)
references
References 20 publications
0
14
0
Order By: Relevance
“…In terms of accuracy, our method has slightly lower accuracy than the previous method [5]. In regard to other previous methods, it is not feasible to compare under fair conditions since many previous works use their own datasets which are not open to the public.…”
Section: Comparisonmentioning
confidence: 81%
See 4 more Smart Citations
“…In terms of accuracy, our method has slightly lower accuracy than the previous method [5]. In regard to other previous methods, it is not feasible to compare under fair conditions since many previous works use their own datasets which are not open to the public.…”
Section: Comparisonmentioning
confidence: 81%
“…The alternative approach is classification based on network logs such as DNS records, NetFlow or proxy server logs. There are several methods which use NetFlow [2], [3], DNS records [13], [14], [15], [16] and proxy server logs [4], [5], [17], [18], [19], [20], [21], [22], [23], [24]. Some approaches focus on NN to detect basic network attacks [25], [26], [27].…”
Section: Related Workmentioning
confidence: 99%
See 3 more Smart Citations