Graph-based techniques for detecting coordinated network attacks
Abstract:
One or more proxy logs are processed in order to generate a graph of domains, wherein those domain pairs in the graph that are connected have low support and high confidence. One or more domains within the graph that are highly connected to other domains in the graph are identified. The identified domains are flagged as suspicious domains.
Information query
Patent Agency Ranking
0/0