Search the World's Largest Database of Information Science & Technology Terms & Definitions
InfInfoScipedia LogoScipedia
A Free Service of IGI Global Publishing House
Below please find a list of definitions for the term that
you selected from multiple scholarly research resources.

What is Malicious Traffic

Handbook of Research on Cyber Crime and Information Privacy
Any suspicious connection or content created or received over the network. Malicious traffic is a threat that creates a security event.
Published in Chapter:
A Black-Box Framework for Malicious Traffic Detection in ICT Environments
Carlos Alberto M. S. Teles (Federal Center for Technological Education of Rio de Janeiro (CEFET-RJ), Brazil), Carlos Roberto Gonçalves Viana Filho (Federal Center for Technological Education of Rio de Janeiro (CEFET-RJ), Brazil), and Felipe da Rocha Henriques (Federal Center for Technological Education of Rio de Janeiro (CEFET-RJ), Brazil)
Copyright: © 2021 |Pages: 20
DOI: 10.4018/978-1-7998-5728-0.ch001
Information security is gradually becoming an area that plays an important role in our daily lives as information and communications technology assets grow with increasingly connected environments. Increasingly we have information from society having their data leaked due to information security flaws in both hardware and software of ICT assets. To identify failures of ICT assets, through the detection of malicious traffic, this chapter proposes a black-box-based framework that aims to detect malicious traffic. The black-box method allows monitor the network without accessing the software or hardware details. In the proposed framework, information security and network resource usage are used together in order to provide a reliable detection of malicious traffic. Firstly, the authors collected network traffic information, generating a dataset from open source networking tools. The proposed detection scheme can identify risks and threats like malware, suspect traffic, and others. The scheme was validated verifying the correlation between network security alerts and network resource usage.
Full Text Chapter Download: US $37.50 Add to Cart
eContent Pro Discount Banner
InfoSci OnDemandECP Editorial ServicesAGOSR