IP2VEC Comparing Similarities between IP Addresses

Authors

  • Sai Viraj  Computer Science Department, New Jersey Institute of Technology, Harrison, USA
  • Yashvi Shah  Computer Science Department, New Jersey Institute of Technology, New York, USA
  • Swetha Sunkara  Computer Science Department, New Jersey Institute of Technology, Livingston, USA

Keywords:

Unusual access patterns, Spike in data transfer, Multiple failed attempts, Anomaly detections

Abstract

There are numerous cyber-attacks in the network and analyzing IP addresses is used to 1. Unusual access patterns 2. Spike in data transfer 3. Multiple failed attempts 4. Anomaly detections

References

  1. Aditya Grover (SU: Stanford University)
  2. Jure Leskovec (SU: Stanford University)106Bryan Perozzi (SBU: Stony Brook University)24
  3. Rami Al-Rfou (SBU: Stony Brook University)
  4. Steven Skiena (SBU: Stony Brook University)

Downloads

Published

2023-11-30

Issue

Section

Research Articles

How to Cite

[1]
Sai Viraj, Yashvi Shah, Swetha Sunkara, " IP2VEC Comparing Similarities between IP Addresses" International Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 9, Issue 6, pp.186-195, November-December-2023.