Results 131 to 140 of about 21,088 (211)
Malicious traffic detection in encrypted network (審査報告)
openaire
A Weakly-supervised Method for Encrypted Malicious Traffic Detection
and addresses the insufficiency of labeled samples. In addition, a multi-instance detector with an attention mechanism is used to identify encrypted malicious traffic from coarse-grained labeled data.
Junyi Liu +6 more
openaire +2 more sources
Some of the next articles are maybe not open access.
Related searches:
Related searches:
Flow Interaction Graph Analysis: Unknown Encrypted Malicious Traffic Detection
IEEE/ACM Transactions on NetworkingNowadays traffic on the Internet has been widely encrypted to protect its confidentiality and privacy. However, traffic encryption is always abused by attackers to conceal their malicious behaviors.
Chuanpu Fu, Qi Li, Ke Xu
openaire +2 more sources
A Survey of Encrypted Malicious Traffic Detection
2021 International Conference on Communications, Computing, Cybersecurity, and Informatics (CCCI), 2021With more and more encrypted traffic such as HTTPS, encrypted traffic protects not only normal traffic, but also malicious traffic. Identification of encrypted malicious traffic without decryption has become a research hotspot. Combined with deep learning, an important branch of machine learning, encrypted malicious traffic detection has achieved good ...
Yanmiao Li +5 more
openaire +1 more source
Cloud Computing for Malicious Encrypted Traffic Analysis and Collaboration
International Journal of Grid and High Performance Computing, 2021As the application of network encryption technology expands, malicious attacks will also be protected by encryption mechanism, increasing the difficulty of detection. This paper focuses on the analysis of encrypted traffic in the network by hosting long-day encrypted traffic, coupled with a weighted algorithm commonly used in information retrieval and ...
Tzung-Han Jeng +5 more
openaire +1 more source
ACM Transactions on Privacy and Security, 2023
In recent years, the use of TLS (Transport Layer Security) protocol to protect communication information has become increasingly popular as users are more aware of network security.
Jinfu Chen +5 more
semanticscholar +1 more source
In recent years, the use of TLS (Transport Layer Security) protocol to protect communication information has become increasingly popular as users are more aware of network security.
Jinfu Chen +5 more
semanticscholar +1 more source
TrafCL: Robust Encrypted Malicious Traffic Detection via Contrastive Learning
Proceedings of the 33rd ACM International Conference on Information and Knowledge ManagementRemote control malwares enable cyber attackers to achieve command and control over victim hosts, which are widely employed in ransomware attacks and espionage operations, jeopardizing personal privacy and state security.
Xiaodu Yang +4 more
openaire +2 more sources
ME-Box: A reliable method to detect malicious encrypted traffic
Journal of Information Security and Applications, 2021Abstract Currently, encryption (such as the Transport Layer Security protocol) is used by increasingly more network applications to protect their security and privacy, while it also benefits network attackers who can encrypt their traffic to evade detection.
Bingfeng Xu, Gaofeng He, Haiting Zhu
openaire +1 more source

