To see the other types of publications on this topic, follow the link: Malicious traffic.

Dissertations / Theses on the topic 'Malicious traffic'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 16 dissertations / theses for your research on the topic 'Malicious traffic.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

Jin, Zhihua. "Visualization of Network Traffic to Detect Malicious Network Activity." Thesis, Norwegian University of Science and Technology, Department of Telematics, 2008. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-8951.

Full text
Abstract:
<p>Today, enormous logging data monitoring the traffics of the Internet is generated everyday. However, the network administrators still have very limited insight into the logging data, mainly due to the lack of efficient analyzing approaches. Most of the existing network monitoring or analysis tools either mainly focus on the throughput of the network in order to assist network structure planning and optimization, which is too high level for security analysis, or dig to too low level into every packet, which is too inefficient in practice. Unfortunately, not all network traffics are legitimat
APA, Harvard, Vancouver, ISO, and other styles
2

Nichols, Tony. "MalWebID_Autodetection and Identification of Malicious Web Hosts Through Live Traffic Analysis." Monterey, California. Naval Postgraduate School, 2013. http://hdl.handle.net/10945/32875.

Full text
Abstract:
Approved for public release; distribution is unlimited<br>This thesis investigates the ability for recently devised packet-level Transmission Control Protocols (TCP) transport classifiers to discover abusive traffic flows, especially those not found via traditional methods, e.g., signatures and real-time blocklists. Transport classification is designed to identify hosts considered to be part of abusive infrastructure without deep packet inspection. A particular focus is to understand the applicability of such methods to live, real-world network traffic obtained from the Naval Postgraduate Scho
APA, Harvard, Vancouver, ISO, and other styles
3

Sandford, Peter. "Inferring malicious network events in commercial ISP networks using traffic summarisation." Thesis, Loughborough University, 2012. https://dspace.lboro.ac.uk/2134/9580.

Full text
Abstract:
With the recent increases in bandwidth available to home users, traffic rates for commercial national networks have also been increasing rapidly. This presents a problem for any network monitoring tool as the traffic rate they are expected to monitor is rising on a monthly basis. Security within these networks is para- mount as they are now an accepted home of trade and commerce. Core networks have been demonstrably and repeatedly open to attack; these events have had significant material costs to high profile targets. Network monitoring is an important part of network security, providing in-
APA, Harvard, Vancouver, ISO, and other styles
4

Kälkäinen, J. (Juha). "Collection and analysis of malicious SSH traffic in Oulu University network." Bachelor's thesis, University of Oulu, 2018. http://urn.fi/URN:NBN:fi:oulu-201812053224.

Full text
Abstract:
Secure Shell (SSH) is a commonly used tool by many organizations to establish secure data communication and remote access to systems that store confidential information and resources. Assessing, defending against and studying the different threats the systems using this protocol are subjected to can be done by using a honeypot. This thesis studied malicious SSH traffic directed at Oulu university network by using an SSH honeypot Cowrie. The honeypot was deployed in the panOULU network located at the Oulu University campus. Two other identical honeypots were deployed from different networks to
APA, Harvard, Vancouver, ISO, and other styles
5

Wulff, Tobias. "Evaluation of and Mitigation against Malicious Traffic in SIP-based VoIP Applications in a Broadband Internet Environment." Thesis, University of Canterbury. Computer Science and Software Engineering, 2010. http://hdl.handle.net/10092/5120.

Full text
Abstract:
Voice Over IP (VoIP) telephony is becoming widespread, and is often integrated into computer networks. Because of his, it is likely that malicious software will threaten VoIP systems the same way traditional computer systems have been attacked by viruses, worms, and other automated agents. While most users have become familiar with email spam and viruses in email attachments, spam and malicious traffic over telephony currently is a relatively unknown threat. VoIP networks are a challenge to secure against such malware as much of the network intelligence is focused on the edge devices and acces
APA, Harvard, Vancouver, ISO, and other styles
6

Токмань, І. О. "Інформаційна інтелектуальна технологія детектування шкідливого трафіку в мережах інтернету речей". Master's thesis, Сумський державний університет, 2018. http://essuir.sumdu.edu.ua/handle/123456789/72290.

Full text
Abstract:
У роботі розглянуто ефективність застосування ряду методів та підходів машинного навчання, визначено закономірності та доцільність реалізацій. Розроблено інформаційну систему класифікації мережевого трафіку з урахування наявних проблем та на основі вивчення типових сценаріїв атак за участю IoT-ботнетів. Побудована інтелектуальна модель реалізовано у формі програмного забезпечення, створеного за допомогою інтерактивної оболонки Jupyter Notebook.
APA, Harvard, Vancouver, ISO, and other styles
7

FAVALE, THOMAS. "Strengthening Privacy and Cybersecurity through Anonymization and Big Data." Doctoral thesis, Politecnico di Torino, 2023. https://hdl.handle.net/11583/2975701.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Alberdi, Ion. "Malicious trafic observation using a framework to parallelize and compose midpoint inspection devices." Thesis, Toulouse, INSA, 2010. http://www.theses.fr/2010ISAT0008/document.

Full text
Abstract:
Notre thèse stipule qu'au vu de l'ampleur des agissements malveillants dans l'Internet, les logiciels d'extrémité doivent être surveillés. Pour limiter le nombre de points de surveillance, nous proposons de surveiller les logiciels depuis un point d'interconnexion. Nous avons dans ce but conçu Luth, un outil permettant de composer et de paralléliser un ensemble d'inspecteurs de points d'interconnexion (appelés MI) qui implémentent des mini IDS, IPS ou pare-feux, tout en vérifiant la correction et l'optimalité de ces derniers, à l'aide d'un langage de configuration et des algorithmes associés.
APA, Harvard, Vancouver, ISO, and other styles
9

Alberdi, Ion. "Malicious trafic observation using a framework to parallelize and compose midpoint inspection devices." Electronic Thesis or Diss., Toulouse, INSA, 2010. http://www.theses.fr/2010ISAT0008.

Full text
Abstract:
Notre thèse stipule qu'au vu de l'ampleur des agissements malveillants dans l'Internet, les logiciels d'extrémité doivent être surveillés. Pour limiter le nombre de points de surveillance, nous proposons de surveiller les logiciels depuis un point d'interconnexion. Nous avons dans ce but conçu Luth, un outil permettant de composer et de paralléliser un ensemble d'inspecteurs de points d'interconnexion (appelés MI) qui implémentent des mini IDS, IPS ou pare-feux, tout en vérifiant la correction et l'optimalité de ces derniers, à l'aide d'un langage de configuration et des algorithmes associés.
APA, Harvard, Vancouver, ISO, and other styles
10

Lakhdari, Nour-Eddine. "FINGERPRINTING MALICIOUS IP TRAFFIC." Thesis, 2014. http://spectrum.library.concordia.ca/978357/1/Lakhdari_MASc_S2014.pdf.

Full text
Abstract:
In the new global economy, cyber-attacks have become a central issue. The detection, mitigation and attribution of such cyber-attacks require efficient and practical techniques to fingerprint malicious IP traffic. By fingerprinting, we refer to: (1) the detection of malicious network flows and, (2) the attribution of the detected flows to malware families that generate them. In this thesis, we firstly address the detection problem and solve it by using a classification technique. The latter uses features that exploit only high-level properties of traffic flows and therefore does not rely on de
APA, Harvard, Vancouver, ISO, and other styles
11

Wu, Tsung-Ju, and 吳宗儒. "Detecting Hiding Malicious Website Using Network Traffic Mining Approach." Thesis, 2009. http://ndltd.ncl.edu.tw/handle/76040403229994551567.

Full text
Abstract:
碩士<br>國立高雄大學<br>資訊管理學系碩士班<br>97<br>As the Internet continues to broaden its coverage worldwide, it has let to a spread of data searching, learning, entertaining, friends making, information exchanging, financing, commercial activities and so on via Internet. This tendency makes the users of the Internet a target of being attacked. There are many kind of network attack such as viruses, worms, and many other malicious codes were implemented to get the illegal benefits or for some particular purpose. In recent years, firewall techniques were being used to reject the anomaly Internet connections.
APA, Harvard, Vancouver, ISO, and other styles
12

Chi-JuiPan and 潘祈睿. "Simplifying Malicious Traffic Classification based on Hybrid Feature Selection." Thesis, 2018. http://ndltd.ncl.edu.tw/handle/7d4gfe.

Full text
APA, Harvard, Vancouver, ISO, and other styles
13

Ding-KaiTseng and 曾鼎凱. "A NetFlow Based Malicious Traffic Detection Research using XGBoost." Thesis, 2018. http://ndltd.ncl.edu.tw/handle/n46zxx.

Full text
APA, Harvard, Vancouver, ISO, and other styles
14

Liu, Chun-rui, and 劉醇瑞. "A Study of Containment Malicious Traffic Flows with Behavioral Probing Method." Thesis, 2006. http://ndltd.ncl.edu.tw/handle/40797238403351250470.

Full text
Abstract:
碩士<br>世新大學<br>資訊管理學研究所(含碩專班)<br>94<br>According to the increase of bandwidth and the widespread usage of internet application, malicious program have infected hundreds and thousands of computers. The early stage of computer viruses has gradually changed to the form of network worms. Through fast and massive spread, the viruses and worms have caused severe damages and have become serious threat to the internet security. Most engineers use signature comparison method to prevent internet security threads. Analysts and researchers announce the worm signature as soon as they discover new type of wo
APA, Harvard, Vancouver, ISO, and other styles
15

HUANG, CHIEN-WEI, and 黃建維. "Detecting IoT Malicious Traffic using Unsupervised Autoencoder with Convolutional Neural Network." Thesis, 2019. http://ndltd.ncl.edu.tw/handle/y55bw6.

Full text
Abstract:
碩士<br>國立中正大學<br>資訊工程研究所<br>107<br>Due to the rise of the Internet of Things, a variety of devices have been made intelligent and cornected to the Internet.As large amout of various types of portable, home, and factory devices become part of the Internet, quite a few of them also been comprised to become part of the IoT botnet.As a consequence, the mirai malicious software comprised millions of IoT devices, causing a DDOS attack of more than 1Tbps to the French website host OVH in 2016. In September 2018 Mirai also attacked Apache Struts, resulting in the leakage of major data of Equifax server
APA, Harvard, Vancouver, ISO, and other styles
16

Mfusi, Boikhutso Florencia. "The policing of road rage incidents in the Gauteng Province." Diss., 2015. http://hdl.handle.net/10500/20281.

Full text
Abstract:
This study followed a qualitative research approach, and semi-structured interviews regarding the subject matter were conducted with the knowledgeable and experienced respondents in the Gauteng traffic-related departments. A literature review was also conducted to provide a comprehensive understanding of the research problem in both local and international context. The research stresses the fact that motorists are continuing to lose their lives on Gauteng province, as a result of violent traffic disputes, therefore people suffer financial, physical, psychological as well as social effects as
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!