PACKETCLIP: multi-modal embedding of network traffic and language for cybersecurity reasoning [PDF]
Traffic classification is vital for cybersecurity, yet encrypted traffic poses significant challenges. We introduce PACKETCLIP which is a multi-modal framework combining packet data with natural language semantics through contrastive pre-training and ...
Ryozo Masukawa +7 more
doaj +2 more sources
A novel encrypted traffic detection model based on detachable convolutional GCN-LSTM [PDF]
With the widespread adoption of network encryption technologies, traditional detection methods increasingly struggle to identify malicious encrypted traffic due to their limited ability to capture structural and behavioral characteristics.
Xiaogang Yuan +3 more
doaj +2 more sources
Anomaly detection in encrypted network traffic using self-supervised learning [PDF]
Privacy and security in network communication have been enhanced via encryption and traditional anomaly detection methods are no longer effective because of their payload inspection.
Sadaf Sattar +7 more
doaj +2 more sources
Research on encrypted malicious traffic detection in power information interaction: application of the electricity multi-granularity flow representation learning approach [PDF]
With the rapid digital transformation of power systems, encrypted communication technologies are increasingly adopted to enhance data privacy and security.
Zhifu Wu +5 more
doaj +2 more sources
Encrypted Malicious Traffic Detection Based on Stacking and Multi-Feature Fusion [PDF]
Although encryption technology protects network communications,plenty malware uses encryption protocols to hide malicious behavior.For the existing Transport Layer Security(TLS) encrypted malicious traffic detection techniques based on machine learning,a
HUO Yuehua, ZHAO Faqi
doaj +1 more source
Encrypted Malicious Traffic Identification Based on Hierarchical Spatiotemporal Feature and Multi-Head Attention [PDF]
To implement the full encryption of Internet,the accurate detection of encrypted malicious traffic is required,but traditional detection methods rely heavily on expert experience and perform poorly in distiguishment of encrypted traffic feature is not ...
JIANG Tongtong, YIN Weixin, CAI Bing, ZHANG Kun
doaj +1 more source
Study on privacy preserving encrypted traffic detection
Existing encrypted traffic detection technologies lack privacy protection for data and models, which will violate the privacy preserving regulations and increase the security risk of privacy leakage.A privacy-preserving encrypted traffic detection system
Xinyu ZHANG +3 more
doaj +3 more sources
Malicious Traffic Detection Combining Features of Packet Payload and Stream Fingerprint [PDF]
The data sets for the detection of malicious traffic by the SSL/TLS protocol are single-sourced.Traditional detection methods take the quintuple feature of network traffic as the main feature for classification,which reduces the accuracy of malicious ...
HU Bin, ZHOU Zhihong, YAO Lihong, LI Jianhua
doaj +1 more source
Edge Intelligence Based Identification and Classification of Encrypted Traffic of Internet of Things
A detection model of Internet of Things encrypted traffic based on edge intelligence is proposed in the paper, which can reduce the communication times of distributed Internet of Things gateways in the process of edge intelligence as well as the ...
Yue Zhao +5 more
doaj +1 more source
Traditional network intrusion detection methods lack the ability of automatic feature extraction for encrypted network malicious traffic, and thus, the detection rates are low.
Jin Yang +4 more
doaj +1 more source

