Title
Modeling Attackers Based on Heterogenous Graph through Malicious HTTP Requests
Abstract
As modern computer attacks are growing more and more complicated, there is a need for defenders to detect malicious activities and analyze which attacker or organization these attacks came from. It is a challenge to model an attacker from malicious web logs. In this paper, we modeled attacker activities based on malicious HTTP requests collected from kinds of websites, which recorded the behavior ...
Year
DOI
Venue
2021
10.1109/CSCWD49262.2021.9437624
2021 IEEE 24th International Conference on Computer Supported Cooperative Work in Design (CSCWD)
Keywords
DocType
ISBN
Computational modeling,Conferences,Organizations,Collaborative work,IP networks
Conference
978-1-7281-6597-4
Citations 
PageRank 
References 
0
0.34
0
Authors
6
Name
Order
Citations
PageRank
Shengqin Ao100.34
Yitong He200.68
Ning Luo300.68
Xuren Wang446.53
Zhengwei Jiang524.76
Jun Jiang602.03