Results 21 to 30 of about 3,240 (155)

Intelligent design of network multimedia using big data and virtual Artificial Intelligence technology

open access: yesIET Networks, EarlyView., 2023
The topic discussed was the intelligent design of network multimedia using BD and virtual AI technology. First of all, the authors gave a brief overview of its relevant research background, and then comprehensively analysed the advantages and disadvantages of previous scholars' research on network multimedia.
Xin Zhang
wiley   +1 more source

CBD: A Deep-Learning-Based Scheme for Encrypted Traffic Classification with a General Pre-Training Method

open access: yesSensors, 2021
With the rapid increase in encrypted traffic in the network environment and the increasing proportion of encrypted traffic, the study of encrypted traffic classification has become increasingly important as a part of traffic analysis.
Xinyi Hu   +3 more
doaj   +1 more source

Identification of encrypted and malicious network traffic based on one-dimensional convolutional neural network

open access: yesJournal of Cloud Computing: Advances, Systems and Applications, 2023
The rapid advancement of the Internet has brought a exponential growth in network traffic. At present, devices deployed at edge nodes process huge amount of data, extract key features of network traffic and then forward them to the cloud server/data ...
Yan Zhou   +8 more
doaj   +1 more source

Encrypted Traffic Classification Method Based on Multi-Layer Bidirectional SRU and Attention Model [PDF]

open access: yesJisuanji gongcheng, 2022
The encrypted traffic classification method based on traditional Recurrent Neural Network(RNN) typically have poor parallelism and low efficiency.To quickly and accurately classify encrypted traffic, a classification method for encrypted traffic based on
ZHANG Surong, BU Youjun, CHEN Bo, SUN Chongxin, WANG Han, HU Xianjun
doaj   +1 more source

Multi-feature fusion based encrypted malicious traffic detection method for coal mine network

open access: yesGong-kuang zidonghua, 2022
The coal mine network is faced with the threat of malicious traffic encrypted by the transport layer security protocol (TLS) generated by malicious software and the high false alarm rate of encrypted traffic during detection.
HUO Yuehua, ZHAO Faqi, WU Wenhao
doaj   +1 more source

Encrypted traffic identification scheme based on sliding window and randomness features

open access: yes网络与信息安全学报
With the development of information technology, network security has increasingly become a focal point for users and organizations, and encrypted data transmission has gradually become mainstream. This trend has driven the proportion of encrypted traffic
Jiachi LIU, Boyu KUANG, Mang SU, Yaqian XU, Anmin FU
doaj   +3 more sources

Practical evaluation of encrypted traffic classification based on a combined method of entropy estimation and neural networks

open access: yesETRI Journal, 2020
Encrypted traffic classification plays a vital role in cybersecurity as network traffic encryption becomes prevalent. First, we briefly introduce three traffic encryption mechanisms: IPsec, SSL/TLS, and SRTP.
Kun Zhou   +3 more
doaj   +1 more source

Encrypted Network Traffic Analysis of Secure Instant Messaging Application: A Case Study of Signal Messenger App

open access: yesApplied Sciences, 2021
Instant messaging applications (apps) have played a vital role in online interaction, especially under COVID-19 lockdown protocols. Apps with security provisions are able to provide confidentiality through end-to-end encryption.
Asmara Afzal   +5 more
doaj   +1 more source

Research on Encrypted Traffic Detection Based on Key Features

open access: yesIEEE Access
Most of the traffic on the Internet is encrypted traffic, and the detection of encrypted traffic is the current difficulty, because the internal features of the data are destroyed after encryption, and it is difficult to detect.
Fangjie Chen, Jingpeng Bai, Weihan Gao
doaj   +1 more source

Malicious Encrypted Traffic Detection Method Based on Conversation Statistical Encoder Model [PDF]

open access: yesJisuanji kexue
With the development and widespread application of network technology,encrypted traffic has become a key technology for protecting user privacy.However,malware and attackers also use encrypted traffic to hide their behaviors and evade traditional network
GONG Siyue, LIU Hui, WANG Baohui
doaj   +1 more source

Home - About - Disclaimer - Privacy