Results 31 to 40 of about 27,602 (172)

Towards practical intrusion detection system over encrypted traffic*

open access: yesIET Information Security, 2021
Privacy and data confidentiality are today at the heart of many discussions. But such data protection should not be done at the detriment of other security aspects.
Sébastien Canard, Chaoyun Li
doaj   +1 more source

An Improved DoH Traffic Classification Method for XGboost

open access: yesJournal of Harbin University of Science and Technology, 2023
Encrypted traffic has become the main traffic in the Internet, and its classification has always been one of the research hotspots.Aiming at the problems of accurate identification of DoH(DNS-over-HTTPS) traffic in the current network, slow processing
LI Bo   +3 more
doaj   +1 more source

Research on Encrypted Traffic Detection Based on Key Features

open access: yesIEEE Access
Most of the traffic on the Internet is encrypted traffic, and the detection of encrypted traffic is the current difficulty, because the internal features of the data are destroyed after encryption, and it is difficult to detect.
Fangjie Chen, Jingpeng Bai, Weihan Gao
doaj   +1 more source

Decrypting SSL/TLS traffic for hidden threats detection

open access: yes, 2019
The paper presents an analysis of the main mechanisms of decryption of SSL/TLS traffic. Methods and technologies for detecting malicious activity in encrypted traffic that are used by leading companies are also considered.
Ageyev, Dmytro   +4 more
core   +1 more source

On the Reverse Engineering of the Citadel Botnet [PDF]

open access: yes, 2014
Citadel is an advanced information-stealing malware which targets financial information. This malware poses a real threat against the confidentiality and integrity of personal and business data. A joint operation was recently conducted by the FBI and the
A Rahimian   +4 more
core   +3 more sources

Anomaly Detection Using XGBoost Ensemble of Deep Neural Network Models

open access: yesCybernetics and Information Technologies, 2021
Intrusion Detection Systems (IDSs) utilise deep learning techniques to identify intrusions with maximum accuracy and reduce false alarm rates. The feature extraction is also automated in these techniques.
Ikram Sumaiya Thaseen   +6 more
doaj   +1 more source

A user-oriented network forensic analyser: the design of a high-level protocol analyser [PDF]

open access: yes, 2014
Network forensics is becoming an increasingly important tool in the investigation of cyber and computer-assisted crimes. Unfortunately, whilst much effort has been undertaken in developing computer forensic file system analysers (e.g.
Clarke, Nathan   +3 more
core   +2 more sources

An Exploit Traffic Detection Method Based on Reverse Shell

open access: yesApplied Sciences, 2023
As the most crucial link in the network kill chain, exploiting a vulnerability is viewed as one of the most popular attack vectors to get the control authority of the system, which is dangerous for legal users.
Yajing Liu   +3 more
doaj   +1 more source

Using Markov Models and Statistics to Learn, Extract, Fuse, and Detect Patterns in Raw Data

open access: yes, 2017
Many systems are partially stochastic in nature. We have derived data driven approaches for extracting stochastic state machines (Markov models) directly from observed data.
Bao Ly Van   +18 more
core   +1 more source

SEABASS: Symmetric-keychain Encryption and Authentication for Building Automation Systems [PDF]

open access: yes, 2018
There is an increasing security risk in Building Automation Systems (BAS) in that its communication is unprotected, resulting in the adversary having the capability to inject spurious commands to the actuators to alter the behaviour of BAS.
Keoh, Sye Loong   +3 more
core   +1 more source

Home - About - Disclaimer - Privacy