Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (2)
  • Open Access

    ARTICLE

    Suboptimal Feature Selection Techniques for Effective Malicious Traffic Detection on Lightweight Devices

    So-Eun Jeon1, Ye-Sol Oh1, Yeon-Ji Lee1, Il-Gu Lee1,2,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.140, No.2, pp. 1669-1687, 2024, DOI:10.32604/cmes.2024.047239 - 20 May 2024

    Abstract With the advancement of wireless network technology, vast amounts of traffic have been generated, and malicious traffic attacks that threaten the network environment are becoming increasingly sophisticated. While signature-based detection methods, static analysis, and dynamic analysis techniques have been previously explored for malicious traffic detection, they have limitations in identifying diversified malware traffic patterns. Recent research has been focused on the application of machine learning to detect these patterns. However, applying machine learning to lightweight devices like IoT devices is challenging because of the high computational demands and complexity involved in the learning process. In… More >

  • Open Access

    ARTICLE

    Malicious Traffic Detection in IoT and Local Networks Using Stacked Ensemble Classifier

    R. D. Pubudu L. Indrasiri1, Ernesto Lee2, Vaibhav Rupapara3, Furqan Rustam4, Imran Ashraf5,*

    CMC-Computers, Materials & Continua, Vol.71, No.1, pp. 489-515, 2022, DOI:10.32604/cmc.2022.019636 - 03 November 2021

    Abstract Malicious traffic detection over the internet is one of the challenging areas for researchers to protect network infrastructures from any malicious activity. Several shortcomings of a network system can be leveraged by an attacker to get unauthorized access through malicious traffic. Safeguard from such attacks requires an efficient automatic system that can detect malicious traffic timely and avoid system damage. Currently, many automated systems can detect malicious activity, however, the efficacy and accuracy need further improvement to detect malicious traffic from multi-domain systems. The present study focuses on the detection of malicious traffic with high… More >

Displaying 1-10 on page 1 of 2. Per Page