Nothing Special   »   [go: up one dir, main page]

Hu et al., 2018 - Google Patents

GANFuzz: A GAN-based industrial network protocol fuzzing framework

Hu et al., 2018

Document ID
14568229546796839133
Author
Hu Z
Shi J
Huang Y
Xiong J
Bu X
Publication year
Publication venue
Proceedings of the 15th ACM International Conference on Computing Frontiers

External Links

Snippet

In this paper, we attempt to improve industrial safety from the perspective of communication security. We leverage the protocol fuzzing technology to reveal errors and vulnerabilities inside implementations of industrial network protocols (INPs). Traditionally, to effectively …
Continue reading at dl.acm.org (other versions)

Similar Documents

Publication Publication Date Title
Hu et al. GANFuzz: A GAN-based industrial network protocol fuzzing framework
Anton et al. Anomaly-based intrusion detection in industrial data with SVM and random forests
Samy et al. Fog-based attack detection framework for internet of things using deep learning
Ortet Lopes et al. Towards effective detection of recent DDoS attacks: A deep learning approach
CN106663167B (en) Identifying behavioral changes of an online service
Garcia et al. A deep learning-based intrusion detection and preventation system for detecting and preventing denial-of-service attacks
Bodström et al. State of the art literature review on network anomaly detection with deep learning
Torres et al. Active learning approach to label network traffic datasets
Liang et al. FARE: enabling fine-grained attack categorization under low-quality labeled data
Dou et al. Pc 2 a: predicting collective contextual anomalies via lstm with deep generative model
Alhayali et al. Optimized machine learning algorithm for intrusion detection
Rovetta et al. Bot or not? a case study on bot recognition from web session logs
Usama et al. The adversarial machine learning conundrum: can the insecurity of ml become the achilles' heel of cognitive networks?
EP4435649A1 (en) Apparatus and method for automatically analyzing malicious event log
Berghout et al. EL-NAHL: Exploring labels autoencoding in augmented hidden layers of feedforward neural networks for cybersecurity in smart grids
KR102692350B1 (en) Malicious event log automatic analysis device and method
Vijayalakshmi et al. Hybrid dual-channel convolution neural network (DCCNN) with spider monkey optimization (SMO) for cyber security threats detection in internet of things
Zarai Recurrent Neural Networks & Deep Neural Networks Based on Intrusion Detection System
Chakraborty et al. Industrial control system device classification using network traffic features and neural network embeddings
He et al. Reinforcement learning meets network intrusion detection: a transferable and adaptable framework for anomaly behavior identification
Meena Siwach Anomaly detection for web log data analysis: A review
Yang et al. Cloud-edge coordinated traffic anomaly detection for industrial cyber-physical systems
Djenouri et al. Interpretable intrusion detection for next generation of Internet of Things
Saheed et al. ResNet50-1D-CNN: A new lightweight resNet50-One-dimensional convolution neural network transfer learning-based approach for improved intrusion detection in cyber-physical systems
Eshak Magdy et al. A Comparative study of intrusion detection systems applied to NSL-KDD Dataset