Feb 2, 2017 · We show that by choosing the parameter of the proposed clustering process optimally using a blacklist, hence making it blacklist-aware, we ...
Jun 1, 2017 · We show that by choosing the parameter of the proposed clustering process optimally using a blacklist, hence making it blacklist-aware, we ...
We show that by choosing the parameter of the proposed clustering process optimally using a blacklist, hence making it blacklist-aware, we significantly improve ...
People also ask
How to check if IP is malicious or not?
What is a known malicious IP?
Who blacklists IP addresses?
What is an infected IP address?
Abstract—Most complex tasks on the Internet—both malicious and benign—are collectively carried out by clusters of IP ad- dresses. We demonstrate that it is ...
This paper proposes a novel clustering framework which can be applied on data sets of network interactions to identify IP clusters carrying out a specific ...
Aug 16, 2023 · [11] Baris Coskun. (un) wisdom of crowds: Accurately spotting malicious ip clusters using not-so-accurate ip blacklists. IEEE Transactions on.
May 20, 2023 · Coskun, “(un) wisdom of crowds: accurately spotting malicious ip clusters using not-so-accurate ip blacklists,” IEEE Transactions on ...
Feb 1, 2022 · Coskun B(Un)Wisdom of crowds: Accurately spotting malicious IP clusters using not-so-accurate IP blacklistsIEEE Transactions on Information ...
Graph neural networks and cross-protocol analysis for detecting ...
www.ncbi.nlm.nih.gov › PMC9471032
Sep 14, 2022 · (Un)wisdom of crowds: accurately spotting malicious IP clusters using not-so-accurate IP blacklists. IEEE Trans Inf Forens Secur. 2017;12(6): ...