Results 1 to 10 of about 27,602 (172)

PACKETCLIP: multi-modal embedding of network traffic and language for cybersecurity reasoning [PDF]

open access: yesFrontiers in Artificial Intelligence
Traffic classification is vital for cybersecurity, yet encrypted traffic poses significant challenges. We introduce PACKETCLIP which is a multi-modal framework combining packet data with natural language semantics through contrastive pre-training and ...
Ryozo Masukawa   +7 more
doaj   +2 more sources

A novel encrypted traffic detection model based on detachable convolutional GCN-LSTM [PDF]

open access: yesScientific Reports
With the widespread adoption of network encryption technologies, traditional detection methods increasingly struggle to identify malicious encrypted traffic due to their limited ability to capture structural and behavioral characteristics.
Xiaogang Yuan   +3 more
doaj   +2 more sources

Anomaly detection in encrypted network traffic using self-supervised learning [PDF]

open access: yesScientific Reports
Privacy and security in network communication have been enhanced via encryption and traditional anomaly detection methods are no longer effective because of their payload inspection.
Sadaf Sattar   +7 more
doaj   +2 more sources

Research on encrypted malicious traffic detection in power information interaction: application of the electricity multi-granularity flow representation learning approach [PDF]

open access: yesScientific Reports
With the rapid digital transformation of power systems, encrypted communication technologies are increasingly adopted to enhance data privacy and security.
Zhifu Wu   +5 more
doaj   +2 more sources

Encrypted Malicious Traffic Detection Based on Stacking and Multi-Feature Fusion [PDF]

open access: yesJisuanji gongcheng, 2023
Although encryption technology protects network communications,plenty malware uses encryption protocols to hide malicious behavior.For the existing Transport Layer Security(TLS) encrypted malicious traffic detection techniques based on machine learning,a
HUO Yuehua, ZHAO Faqi
doaj   +1 more source

Encrypted Malicious Traffic Identification Based on Hierarchical Spatiotemporal Feature and Multi-Head Attention [PDF]

open access: yesJisuanji gongcheng, 2021
To implement the full encryption of Internet,the accurate detection of encrypted malicious traffic is required,but traditional detection methods rely heavily on expert experience and perform poorly in distiguishment of encrypted traffic feature is not ...
JIANG Tongtong, YIN Weixin, CAI Bing, ZHANG Kun
doaj   +1 more source

Study on privacy preserving encrypted traffic detection

open access: yes网络与信息安全学报, 2021
Existing encrypted traffic detection technologies lack privacy protection for data and models, which will violate the privacy preserving regulations and increase the security risk of privacy leakage.A privacy-preserving encrypted traffic detection system
Xinyu ZHANG   +3 more
doaj   +3 more sources

Malicious Traffic Detection Combining Features of Packet Payload and Stream Fingerprint [PDF]

open access: yesJisuanji gongcheng, 2020
The data sets for the detection of malicious traffic by the SSL/TLS protocol are single-sourced.Traditional detection methods take the quintuple feature of network traffic as the main feature for classification,which reduces the accuracy of malicious ...
HU Bin, ZHOU Zhihong, YAO Lihong, LI Jianhua
doaj   +1 more source

Edge Intelligence Based Identification and Classification of Encrypted Traffic of Internet of Things

open access: yesIEEE Access, 2021
A detection model of Internet of Things encrypted traffic based on edge intelligence is proposed in the paper, which can reduce the communication times of distributed Internet of Things gateways in the process of edge intelligence as well as the ...
Yue Zhao   +5 more
doaj   +1 more source

A deep‐learning‐ and reinforcement‐learning‐based system for encrypted network malicious traffic detection

open access: yesElectronics Letters, 2021
Traditional network intrusion detection methods lack the ability of automatic feature extraction for encrypted network malicious traffic, and thus, the detection rates are low.
Jin Yang   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy