Results 21 to 30 of about 21,088 (211)

Research on Malicious Encrypted Traffic Annotation Method for Android Mobile Application [PDF]

open access: yesJisuanji gongcheng, 2020
In order to distinguish malicious traffic generated by running malicious Android applications from normal traffic,this paper proposes a method for annotating malicious traffic of mobile Android applications.For encrypted network traffic,encryption ...
HE Gaofeng, SI Yongrui, XU Bingfeng
doaj   +1 more source

Malicious Encrypted Traffic Detection Integrating One-Dimensional Inception Structure and ViT [PDF]

open access: yesJisuanji gongcheng, 2023
In Internet encryption, traditional malicious traffic detection performs poorly in distinguishing encrypted traffic.To detect malicious traffic in encrypted traffic better, this paper designs a malicious encryption traffic detection model integrating a ...
SUN Yi, GAO Jian, GU Yijun
doaj   +1 more source

Feature Mining for Encrypted Malicious Traffic Detection with Deep Learning and Other Machine Learning Algorithms [PDF]

open access: yesComputers & security, 2023
The popularity of encryption mechanisms poses a great challenge to malicious traffic detection. The reason is traditional detection techniques cannot work without the decryption of encrypted traffic.
Zihao Wang, V. Thing
semanticscholar   +1 more source

Machine learning for encrypted malicious traffic detection: Approaches, datasets and comparative study [PDF]

open access: yesComputers & security, 2021
As people’s demand for personal privacy and data security becomes a priority, encrypted traffic has become mainstream in the cyber world. However, traffic encryption is also shielding malicious and illegal traffic introduced by adversaries, from being ...
Zihao Wang, Fok Kar Wai, V. Thing
semanticscholar   +1 more source

Malicious Traffic Detection Combining Features of Packet Payload and Stream Fingerprint [PDF]

open access: yesJisuanji gongcheng, 2020
The data sets for the detection of malicious traffic by the SSL/TLS protocol are single-sourced.Traditional detection methods take the quintuple feature of network traffic as the main feature for classification,which reduces the accuracy of malicious ...
HU Bin, ZHOU Zhihong, YAO Lihong, LI Jianhua
doaj   +1 more source

A deep‐learning‐ and reinforcement‐learning‐based system for encrypted network malicious traffic detection

open access: yesElectronics Letters, 2021
Traditional network intrusion detection methods lack the ability of automatic feature extraction for encrypted network malicious traffic, and thus, the detection rates are low.
Jin Yang   +4 more
doaj   +1 more source

Multi-feature fusion based encrypted malicious traffic detection method for coal mine network

open access: yesGong-kuang zidonghua, 2022
The coal mine network is faced with the threat of malicious traffic encrypted by the transport layer security protocol (TLS) generated by malicious software and the high false alarm rate of encrypted traffic during detection.
HUO Yuehua, ZHAO Faqi, WU Wenhao
doaj   +1 more source

Encrypted Malicious Traffic Identification Based on CNN CBAM-BiGRU Attention [PDF]

open access: yesJisuanji gongcheng, 2023
Encrypting network traffic helps protect data security and user privacy; however, encryption also hides the characteristics of the data, making it difficult to identify malicious traffic.
Xin DENG, Zhaohui LIU, Yan OUYANG, Jianhua CHEN
doaj   +1 more source

Improved malicious node detection method for detecting a bait in an extensive network for getting the maximum throughput

open access: yesIET Communications, EarlyView., 2022
Abstract Mobile Ad‐hoc Network (MANET) is an ad hoc Wireless subset with a unique dynamic geometry of the system and movable nodes. The MANETs are auto‐organized networks that permit mobility without infrastructure. Specific protocols for MANET routing are provided with these attributes.
Shalini Goel   +5 more
wiley   +1 more source

Scheme for identifying malware traffic with TLS data based on machine learning

open access: yes网络与信息安全学报, 2020
Based on analyzing the characteristics of transport layer security (TLS) protocol,a distributed automation malicious traffic detecting system based on machine learning was designed.The characteristics of encrypted malware traffic from TLS data,observable
Ziming LUO, Shubin XU, Xiaodong LIU
doaj   +3 more sources

Home - About - Disclaimer - Privacy