Results 21 to 30 of about 3,240 (155)
The topic discussed was the intelligent design of network multimedia using BD and virtual AI technology. First of all, the authors gave a brief overview of its relevant research background, and then comprehensively analysed the advantages and disadvantages of previous scholars' research on network multimedia.
Xin Zhang
wiley +1 more source
With the rapid increase in encrypted traffic in the network environment and the increasing proportion of encrypted traffic, the study of encrypted traffic classification has become increasingly important as a part of traffic analysis.
Xinyi Hu +3 more
doaj +1 more source
The rapid advancement of the Internet has brought a exponential growth in network traffic. At present, devices deployed at edge nodes process huge amount of data, extract key features of network traffic and then forward them to the cloud server/data ...
Yan Zhou +8 more
doaj +1 more source
Encrypted Traffic Classification Method Based on Multi-Layer Bidirectional SRU and Attention Model [PDF]
The encrypted traffic classification method based on traditional Recurrent Neural Network(RNN) typically have poor parallelism and low efficiency.To quickly and accurately classify encrypted traffic, a classification method for encrypted traffic based on
ZHANG Surong, BU Youjun, CHEN Bo, SUN Chongxin, WANG Han, HU Xianjun
doaj +1 more source
Multi-feature fusion based encrypted malicious traffic detection method for coal mine network
The coal mine network is faced with the threat of malicious traffic encrypted by the transport layer security protocol (TLS) generated by malicious software and the high false alarm rate of encrypted traffic during detection.
HUO Yuehua, ZHAO Faqi, WU Wenhao
doaj +1 more source
Encrypted traffic identification scheme based on sliding window and randomness features
With the development of information technology, network security has increasingly become a focal point for users and organizations, and encrypted data transmission has gradually become mainstream. This trend has driven the proportion of encrypted traffic
Jiachi LIU, Boyu KUANG, Mang SU, Yaqian XU, Anmin FU
doaj +3 more sources
Encrypted traffic classification plays a vital role in cybersecurity as network traffic encryption becomes prevalent. First, we briefly introduce three traffic encryption mechanisms: IPsec, SSL/TLS, and SRTP.
Kun Zhou +3 more
doaj +1 more source
Instant messaging applications (apps) have played a vital role in online interaction, especially under COVID-19 lockdown protocols. Apps with security provisions are able to provide confidentiality through end-to-end encryption.
Asmara Afzal +5 more
doaj +1 more source
Research on Encrypted Traffic Detection Based on Key Features
Most of the traffic on the Internet is encrypted traffic, and the detection of encrypted traffic is the current difficulty, because the internal features of the data are destroyed after encryption, and it is difficult to detect.
Fangjie Chen, Jingpeng Bai, Weihan Gao
doaj +1 more source
Malicious Encrypted Traffic Detection Method Based on Conversation Statistical Encoder Model [PDF]
With the development and widespread application of network technology,encrypted traffic has become a key technology for protecting user privacy.However,malware and attackers also use encrypted traffic to hide their behaviors and evade traditional network
GONG Siyue, LIU Hui, WANG Baohui
doaj +1 more source

