Multi-feature fusion based encrypted malicious traffic detection method for coal mine network
The coal mine network is faced with the threat of malicious traffic encrypted by the transport layer security protocol (TLS) generated by malicious software and the high false alarm rate of encrypted traffic during detection.
HUO Yuehua, ZHAO Faqi, WU Wenhao
doaj +1 more source
Research on Malicious Encrypted Traffic Annotation Method for Android Mobile Application [PDF]
In order to distinguish malicious traffic generated by running malicious Android applications from normal traffic,this paper proposes a method for annotating malicious traffic of mobile Android applications.For encrypted network traffic,encryption ...
HE Gaofeng, SI Yongrui, XU Bingfeng
doaj +1 more source
Malicious Encrypted Traffic Detection Integrating One-Dimensional Inception Structure and ViT [PDF]
In Internet encryption, traditional malicious traffic detection performs poorly in distinguishing encrypted traffic.To detect malicious traffic in encrypted traffic better, this paper designs a malicious encryption traffic detection model integrating a ...
SUN Yi, GAO Jian, GU Yijun
doaj +1 more source
Survey of encrypted malicious traffic detection based on deep learning
With the increasing awareness of network security, encrypted communication dominates and encrypted traffic grows rapidly. Traffic encryption, while protecting privacy, also masks illegal attempts and changes the form of threats.
ZHAI Mingfang, ZHANG Xingming, ZHAO Bo
doaj +3 more sources
Encrypted Traffic Classification Method Based on Multi-Layer Bidirectional SRU and Attention Model [PDF]
The encrypted traffic classification method based on traditional Recurrent Neural Network(RNN) typically have poor parallelism and low efficiency.To quickly and accurately classify encrypted traffic, a classification method for encrypted traffic based on
ZHANG Surong, BU Youjun, CHEN Bo, SUN Chongxin, WANG Han, HU Xianjun
doaj +1 more source
Analysis of Approaches to Detecting Attacks in Encrypted Traffic
The automatic detection of network intrusions has been under active study since the 1980s. Of particular interest is the detection of attacks in encrypted web traffic, the percentage of which on the Internet is increasing.
Marina Polyanskaya
doaj +1 more source
Identification of Malicious Encrypted Traffic Through Feature Fusion
The popularity of encrypted communication has grown due to increased security awareness and rapid internet development. End-to-end encryption can prevent data attacks but also poses new cybersecurity threats. Thus, identifying malicious encrypted traffic
Xianchun Zheng, Hui Li
doaj +1 more source
Secure Communication using Identity Based Encryption [PDF]
Secured communication has been widely deployed to guarantee confidentiality and\ud integrity of connections over untrusted networks, e.g., the Internet.
Cheng, Feng +3 more
core +6 more sources
Review of Key Technologies of Incremental Intrusion Detection for Network Encrypted Traffic [PDF]
As cyber threats continue to intensify, the concealment of encrypted traffic attacks and the suddenness of zero-day exploits have significantly reduced the detection efficiency of traditional intrusion detection systems.
CHEN Liangchen, FU Deyin, LIU Baoxu, GAO Shu, ZHANG Xuyao
doaj +1 more source
Abstract Mobile Ad‐hoc Network (MANET) is an ad hoc Wireless subset with a unique dynamic geometry of the system and movable nodes. The MANETs are auto‐organized networks that permit mobility without infrastructure. Specific protocols for MANET routing are provided with these attributes.
Shalini Goel +5 more
wiley +1 more source

