Results 31 to 40 of about 27,602 (172)
Towards practical intrusion detection system over encrypted traffic*
Privacy and data confidentiality are today at the heart of many discussions. But such data protection should not be done at the detriment of other security aspects.
Sébastien Canard, Chaoyun Li
doaj +1 more source
An Improved DoH Traffic Classification Method for XGboost
Encrypted traffic has become the main traffic in the Internet, and its classification has always been one of the research hotspots.Aiming at the problems of accurate identification of DoH(DNS-over-HTTPS) traffic in the current network, slow processing
LI Bo +3 more
doaj +1 more source
Research on Encrypted Traffic Detection Based on Key Features
Most of the traffic on the Internet is encrypted traffic, and the detection of encrypted traffic is the current difficulty, because the internal features of the data are destroyed after encryption, and it is difficult to detect.
Fangjie Chen, Jingpeng Bai, Weihan Gao
doaj +1 more source
Decrypting SSL/TLS traffic for hidden threats detection
The paper presents an analysis of the main mechanisms of decryption of SSL/TLS traffic. Methods and technologies for detecting malicious activity in encrypted traffic that are used by leading companies are also considered.
Ageyev, Dmytro +4 more
core +1 more source
On the Reverse Engineering of the Citadel Botnet [PDF]
Citadel is an advanced information-stealing malware which targets financial information. This malware poses a real threat against the confidentiality and integrity of personal and business data. A joint operation was recently conducted by the FBI and the
A Rahimian +4 more
core +3 more sources
Anomaly Detection Using XGBoost Ensemble of Deep Neural Network Models
Intrusion Detection Systems (IDSs) utilise deep learning techniques to identify intrusions with maximum accuracy and reduce false alarm rates. The feature extraction is also automated in these techniques.
Ikram Sumaiya Thaseen +6 more
doaj +1 more source
A user-oriented network forensic analyser: the design of a high-level protocol analyser [PDF]
Network forensics is becoming an increasingly important tool in the investigation of cyber and computer-assisted crimes. Unfortunately, whilst much effort has been undertaken in developing computer forensic file system analysers (e.g.
Clarke, Nathan +3 more
core +2 more sources
An Exploit Traffic Detection Method Based on Reverse Shell
As the most crucial link in the network kill chain, exploiting a vulnerability is viewed as one of the most popular attack vectors to get the control authority of the system, which is dangerous for legal users.
Yajing Liu +3 more
doaj +1 more source
Using Markov Models and Statistics to Learn, Extract, Fuse, and Detect Patterns in Raw Data
Many systems are partially stochastic in nature. We have derived data driven approaches for extracting stochastic state machines (Markov models) directly from observed data.
Bao Ly Van +18 more
core +1 more source
SEABASS: Symmetric-keychain Encryption and Authentication for Building Automation Systems [PDF]
There is an increasing security risk in Building Automation Systems (BAS) in that its communication is unprotected, resulting in the adversary having the capability to inject spurious commands to the actuators to alter the behaviour of BAS.
Keoh, Sye Loong +3 more
core +1 more source

