Results 11 to 20 of about 27,602 (172)

Multi-feature fusion based encrypted malicious traffic detection method for coal mine network

open access: yesGong-kuang zidonghua, 2022
The coal mine network is faced with the threat of malicious traffic encrypted by the transport layer security protocol (TLS) generated by malicious software and the high false alarm rate of encrypted traffic during detection.
HUO Yuehua, ZHAO Faqi, WU Wenhao
doaj   +1 more source

Research on Malicious Encrypted Traffic Annotation Method for Android Mobile Application [PDF]

open access: yesJisuanji gongcheng, 2020
In order to distinguish malicious traffic generated by running malicious Android applications from normal traffic,this paper proposes a method for annotating malicious traffic of mobile Android applications.For encrypted network traffic,encryption ...
HE Gaofeng, SI Yongrui, XU Bingfeng
doaj   +1 more source

Malicious Encrypted Traffic Detection Integrating One-Dimensional Inception Structure and ViT [PDF]

open access: yesJisuanji gongcheng, 2023
In Internet encryption, traditional malicious traffic detection performs poorly in distinguishing encrypted traffic.To detect malicious traffic in encrypted traffic better, this paper designs a malicious encryption traffic detection model integrating a ...
SUN Yi, GAO Jian, GU Yijun
doaj   +1 more source

Survey of encrypted malicious traffic detection based on deep learning

open access: yes网络与信息安全学报, 2020
With the increasing awareness of network security, encrypted communication dominates and encrypted traffic grows rapidly. Traffic encryption, while protecting privacy, also masks illegal attempts and changes the form of threats.
ZHAI Mingfang, ZHANG Xingming, ZHAO Bo
doaj   +3 more sources

Encrypted Traffic Classification Method Based on Multi-Layer Bidirectional SRU and Attention Model [PDF]

open access: yesJisuanji gongcheng, 2022
The encrypted traffic classification method based on traditional Recurrent Neural Network(RNN) typically have poor parallelism and low efficiency.To quickly and accurately classify encrypted traffic, a classification method for encrypted traffic based on
ZHANG Surong, BU Youjun, CHEN Bo, SUN Chongxin, WANG Han, HU Xianjun
doaj   +1 more source

Analysis of Approaches to Detecting Attacks in Encrypted Traffic

open access: yesСовременные информационные технологии и IT-образование, 2021
The automatic detection of network intrusions has been under active study since the 1980s. Of particular interest is the detection of attacks in encrypted web traffic, the percentage of which on the Internet is increasing.
Marina Polyanskaya
doaj   +1 more source

Identification of Malicious Encrypted Traffic Through Feature Fusion

open access: yesIEEE Access, 2023
The popularity of encrypted communication has grown due to increased security awareness and rapid internet development. End-to-end encryption can prevent data attacks but also poses new cybersecurity threats. Thus, identifying malicious encrypted traffic
Xianchun Zheng, Hui Li
doaj   +1 more source

Secure Communication using Identity Based Encryption [PDF]

open access: yes, 2010
Secured communication has been widely deployed to guarantee confidentiality and\ud integrity of connections over untrusted networks, e.g., the Internet.
Cheng, Feng   +3 more
core   +6 more sources

Review of Key Technologies of Incremental Intrusion Detection for Network Encrypted Traffic [PDF]

open access: yesJisuanji gongcheng
As cyber threats continue to intensify, the concealment of encrypted traffic attacks and the suddenness of zero-day exploits have significantly reduced the detection efficiency of traditional intrusion detection systems.
CHEN Liangchen, FU Deyin, LIU Baoxu, GAO Shu, ZHANG Xuyao
doaj   +1 more source

Improved malicious node detection method for detecting a bait in an extensive network for getting the maximum throughput

open access: yesIET Communications, EarlyView., 2022
Abstract Mobile Ad‐hoc Network (MANET) is an ad hoc Wireless subset with a unique dynamic geometry of the system and movable nodes. The MANETs are auto‐organized networks that permit mobility without infrastructure. Specific protocols for MANET routing are provided with these attributes.
Shalini Goel   +5 more
wiley   +1 more source

Home - About - Disclaimer - Privacy