Results 131 to 140 of about 21,088 (211)

Malicious traffic detection in encrypted network (審査報告)

open access: yesMalicious traffic detection in encrypted network (審査報告)
openaire  

A Weakly-supervised Method for Encrypted Malicious Traffic Detection

open access: yesProceedings of International Symposium on Grids & Clouds 2022 — PoS(ISGC2022), 2022
and addresses the insufficiency of labeled samples. In addition, a multi-instance detector with an attention mechanism is used to identify encrypted malicious traffic from coarse-grained labeled data.
Junyi Liu   +6 more
openaire   +2 more sources

Flow Interaction Graph Analysis: Unknown Encrypted Malicious Traffic Detection

IEEE/ACM Transactions on Networking
Nowadays traffic on the Internet has been widely encrypted to protect its confidentiality and privacy. However, traffic encryption is always abused by attackers to conceal their malicious behaviors.
Chuanpu Fu, Qi Li, Ke Xu
openaire   +2 more sources

A Survey of Encrypted Malicious Traffic Detection

2021 International Conference on Communications, Computing, Cybersecurity, and Informatics (CCCI), 2021
With more and more encrypted traffic such as HTTPS, encrypted traffic protects not only normal traffic, but also malicious traffic. Identification of encrypted malicious traffic without decryption has become a research hotspot. Combined with deep learning, an important branch of machine learning, encrypted malicious traffic detection has achieved good ...
Yanmiao Li   +5 more
openaire   +1 more source

Cloud Computing for Malicious Encrypted Traffic Analysis and Collaboration

International Journal of Grid and High Performance Computing, 2021
As the application of network encryption technology expands, malicious attacks will also be protected by encryption mechanism, increasing the difficulty of detection. This paper focuses on the analysis of encrypted traffic in the network by hosting long-day encrypted traffic, coupled with a weighted algorithm commonly used in information retrieval and ...
Tzung-Han Jeng   +5 more
openaire   +1 more source

TLS-MHSA: An Efficient Detection Model for Encrypted Malicious Traffic based on Multi-Head Self-Attention Mechanism

ACM Transactions on Privacy and Security, 2023
In recent years, the use of TLS (Transport Layer Security) protocol to protect communication information has become increasingly popular as users are more aware of network security.
Jinfu Chen   +5 more
semanticscholar   +1 more source

TrafCL: Robust Encrypted Malicious Traffic Detection via Contrastive Learning

Proceedings of the 33rd ACM International Conference on Information and Knowledge Management
Remote control malwares enable cyber attackers to achieve command and control over victim hosts, which are widely employed in ransomware attacks and espionage operations, jeopardizing personal privacy and state security.
Xiaodu Yang   +4 more
openaire   +2 more sources

ME-Box: A reliable method to detect malicious encrypted traffic

Journal of Information Security and Applications, 2021
Abstract Currently, encryption (such as the Transport Layer Security protocol) is used by increasingly more network applications to protect their security and privacy, while it also benefits network attackers who can encrypt their traffic to evade detection.
Bingfeng Xu, Gaofeng He, Haiting Zhu
openaire   +1 more source

Home - About - Disclaimer - Privacy