IP2VEC Comparing Similarities between IP Addresses
Keywords:
Unusual access patterns, Spike in data transfer, Multiple failed attempts, Anomaly detectionsAbstract
There are numerous cyber-attacks in the network and analyzing IP addresses is used to 1. Unusual access patterns 2. Spike in data transfer 3. Multiple failed attempts 4. Anomaly detections
References
- Aditya Grover (SU: Stanford University)
- Jure Leskovec (SU: Stanford University)106Bryan Perozzi (SBU: Stony Brook University)24
- Rami Al-Rfou (SBU: Stony Brook University)
- Steven Skiena (SBU: Stony Brook University)
Downloads
Published
2023-11-30
Issue
Section
Research Articles
License
Copyright (c) IJSRCSEIT

This work is licensed under a Creative Commons Attribution 4.0 International License.
How to Cite
[1]
Sai Viraj, Yashvi Shah, Swetha Sunkara, "
IP2VEC Comparing Similarities between IP Addresses" International Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307,
Volume 9, Issue 6, pp.186-195, November-December-2023.