Results 1 to 10 of about 36,419 (228)

Neural network-based symmetric encryption algorithm with encrypted traffic protocol identification [PDF]

open access: yesPeerJ Computer Science
Cryptography is a cornerstone of power grid security, with the symmetry and asymmetry of cryptographic algorithms directly influencing the resilience of power systems against cyberattacks.
Jiakai Hao   +3 more
doaj   +5 more sources

A VPN-Encrypted Traffic Identification Method Based on Ensemble Learning

open access: yesApplied Sciences, 2022
One of the foundational and key means of optimizing network service in the field of network security is traffic identification. Various data transmission encryption technologies have been widely employed in recent years.
Jie Cao   +4 more
doaj   +3 more sources

Identification of Malicious Encrypted Traffic Through Feature Fusion

open access: yesIEEE Access, 2023
The popularity of encrypted communication has grown due to increased security awareness and rapid internet development. End-to-end encryption can prevent data attacks but also poses new cybersecurity threats. Thus, identifying malicious encrypted traffic
Xianchun Zheng, Hui Li
doaj   +3 more sources

Review and perspective on encrypted traffic identification research

open access: yesTongxin xuebao, 2016
Considering the importance of encrypted traffic identification technology and existing research work,first,the type of encrypted traffic identification according to the demand of traffic analysis were introduced,such as protocols,applications and ...
Wu-bin PAN   +3 more
doaj   +3 more sources

Accurate Encrypted Malicious Traffic Identification via Traffic Interaction Pattern Using Graph Convolutional Network

open access: yesApplied Sciences, 2023
Telecommuting and telelearning have gradually become mainstream lifestyles in the post-epidemic era. The extensive interconnection of massive terminals gives attackers more opportunities, which brings more significant challenges to network traffic ...
Guoqiang Ren, Guang Cheng, Nan Fu
doaj   +2 more sources

FedETC: Encrypted traffic classification based on federated learning [PDF]

open access: yesHeliyon
The current popular traffic classification methods based on feature engineering and machine learning are difficult to obtain suitable traffic feature sets for multiple traffic classification tasks.
Zhiping Jin   +5 more
doaj   +2 more sources

Identification of VoIP encrypted traffic using a machine learning approach

open access: yesJournal of King Saud University: Computer and Information Sciences, 2015
We investigate the performance of three different machine learning algorithms, namely C5.0, AdaBoost and Genetic programming (GP), to generate robust classifiers for identifying VoIP encrypted traffic. To this end, a novel approach (Alshammari and Zincir-
Riyad Alshammari, A. Nur Zincir-Heywood
doaj   +2 more sources

Encrypted Malicious Traffic Identification Based on Hierarchical Spatiotemporal Feature and Multi-Head Attention [PDF]

open access: yesJisuanji gongcheng, 2021
To implement the full encryption of Internet,the accurate detection of encrypted malicious traffic is required,but traditional detection methods rely heavily on expert experience and perform poorly in distiguishment of encrypted traffic feature is not ...
JIANG Tongtong, YIN Weixin, CAI Bing, ZHANG Kun
doaj   +1 more source

Encrypted Malicious Traffic Detection Based on Stacking and Multi-Feature Fusion [PDF]

open access: yesJisuanji gongcheng, 2023
Although encryption technology protects network communications,plenty malware uses encryption protocols to hide malicious behavior.For the existing Transport Layer Security(TLS) encrypted malicious traffic detection techniques based on machine learning,a
HUO Yuehua, ZHAO Faqi
doaj   +1 more source

Deep Learning-Based Efficient Analysis for Encrypted Traffic

open access: yesApplied Sciences, 2023
To safeguard user privacy, critical Internet traffic is often transmitted using encryption. While encryption is crucial for protecting sensitive information, it poses challenges for traffic identification and poses hidden dangers to network security.
Xiaodan Yan
doaj   +1 more source

Home - About - Disclaimer - Privacy