Abstract | ||
---|---|---|
As modern computer attacks are growing more and more complicated, there is a need for defenders to detect malicious activities and analyze which attacker or organization these attacks came from. It is a challenge to model an attacker from malicious web logs. In this paper, we modeled attacker activities based on malicious HTTP requests collected from kinds of websites, which recorded the behavior ... |
Year | DOI | Venue |
---|---|---|
2021 | 10.1109/CSCWD49262.2021.9437624 | 2021 IEEE 24th International Conference on Computer Supported Cooperative Work in Design (CSCWD) |
Keywords | DocType | ISBN |
Computational modeling,Conferences,Organizations,Collaborative work,IP networks | Conference | 978-1-7281-6597-4 |
Citations | PageRank | References |
0 | 0.34 | 0 |
Authors | ||
6 |
Name | Order | Citations | PageRank |
---|---|---|---|
Shengqin Ao | 1 | 0 | 0.34 |
Yitong He | 2 | 0 | 0.68 |
Ning Luo | 3 | 0 | 0.68 |
Xuren Wang | 4 | 4 | 6.53 |
Zhengwei Jiang | 5 | 2 | 4.76 |
Jun Jiang | 6 | 0 | 2.03 |