Research on Malicious Encrypted Traffic Annotation Method for Android Mobile Application [PDF]
In order to distinguish malicious traffic generated by running malicious Android applications from normal traffic,this paper proposes a method for annotating malicious traffic of mobile Android applications.For encrypted network traffic,encryption ...
HE Gaofeng, SI Yongrui, XU Bingfeng
doaj +1 more source
Malicious Encrypted Traffic Detection Integrating One-Dimensional Inception Structure and ViT [PDF]
In Internet encryption, traditional malicious traffic detection performs poorly in distinguishing encrypted traffic.To detect malicious traffic in encrypted traffic better, this paper designs a malicious encryption traffic detection model integrating a ...
SUN Yi, GAO Jian, GU Yijun
doaj +1 more source
Feature Mining for Encrypted Malicious Traffic Detection with Deep Learning and Other Machine Learning Algorithms [PDF]
The popularity of encryption mechanisms poses a great challenge to malicious traffic detection. The reason is traditional detection techniques cannot work without the decryption of encrypted traffic.
Zihao Wang, V. Thing
semanticscholar +1 more source
Machine learning for encrypted malicious traffic detection: Approaches, datasets and comparative study [PDF]
As people’s demand for personal privacy and data security becomes a priority, encrypted traffic has become mainstream in the cyber world. However, traffic encryption is also shielding malicious and illegal traffic introduced by adversaries, from being ...
Zihao Wang, Fok Kar Wai, V. Thing
semanticscholar +1 more source
Malicious Traffic Detection Combining Features of Packet Payload and Stream Fingerprint [PDF]
The data sets for the detection of malicious traffic by the SSL/TLS protocol are single-sourced.Traditional detection methods take the quintuple feature of network traffic as the main feature for classification,which reduces the accuracy of malicious ...
HU Bin, ZHOU Zhihong, YAO Lihong, LI Jianhua
doaj +1 more source
Traditional network intrusion detection methods lack the ability of automatic feature extraction for encrypted network malicious traffic, and thus, the detection rates are low.
Jin Yang +4 more
doaj +1 more source
Multi-feature fusion based encrypted malicious traffic detection method for coal mine network
The coal mine network is faced with the threat of malicious traffic encrypted by the transport layer security protocol (TLS) generated by malicious software and the high false alarm rate of encrypted traffic during detection.
HUO Yuehua, ZHAO Faqi, WU Wenhao
doaj +1 more source
Encrypted Malicious Traffic Identification Based on CNN CBAM-BiGRU Attention [PDF]
Encrypting network traffic helps protect data security and user privacy; however, encryption also hides the characteristics of the data, making it difficult to identify malicious traffic.
Xin DENG, Zhaohui LIU, Yan OUYANG, Jianhua CHEN
doaj +1 more source
Abstract Mobile Ad‐hoc Network (MANET) is an ad hoc Wireless subset with a unique dynamic geometry of the system and movable nodes. The MANETs are auto‐organized networks that permit mobility without infrastructure. Specific protocols for MANET routing are provided with these attributes.
Shalini Goel +5 more
wiley +1 more source
Scheme for identifying malware traffic with TLS data based on machine learning
Based on analyzing the characteristics of transport layer security (TLS) protocol,a distributed automation malicious traffic detecting system based on machine learning was designed.The characteristics of encrypted malware traffic from TLS data,observable
Ziming LUO, Shubin XU, Xiaodong LIU
doaj +3 more sources

