Login / Signup
Detecting unknown HTTP-based malicious communication behavior via generated adversarial flows and hierarchical traffic features.
Xiaochun Yun
Jiang Xie
Shuhao Li
Yongzheng Zhang
Peishuai Sun
Published in:
CoRR (2023)
Keyphrases
</>
multi agent
image features
co occurrence
feature vectors
traffic patterns
feature space
classification accuracy
open source
communication networks
traffic flow
extracted features
malicious behavior
real time
origin destination
communication patterns
computer networks
feature set
low level
feature extraction