Modeling Attackers Based on Heterogenous Graph through Malicious HTTP Requests

2021 IEEE 24th International Conference on Computer Supported Cooperative Work in Design (CSCWD)(2021)

引用 0|浏览1
暂无评分
摘要
As modern computer attacks are growing more and more complicated, there is a need for defenders to detect malicious activities and analyze which attacker or organization these attacks came from. It is a challenge to model an attacker from malicious web logs. In this paper, we modeled attacker activities based on malicious HTTP requests collected from kinds of websites, which recorded the behavior ...
更多
查看译文
关键词
Computational modeling,Conferences,Organizations,Collaborative work,IP networks
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要