Utilising Flow Aggregation to Classify Benign Imitating Attacks.
Hanan HindyRobert C. AtkinsonChristos TachtatzisEthan BayneMiroslav BuresXavier J. A. BellekensPublished in: CoRR (2021)
Keyphrases
- detecting malicious
- flow field
- malicious attacks
- automatic classification
- breast cancer
- traffic analysis
- countermeasures
- aggregation operators
- flow patterns
- malware detection
- malicious users
- rank aggregation
- security protocols
- watermarking scheme
- information flow
- neural network
- data corruption
- chosen plaintext
- attack detection
- security mechanisms
- wireless sensor networks