Results 151 to 160 of about 36,419 (228)
Some of the next articles are maybe not open access.
OTTer: A Scalable High-Resolution Encrypted Traffic Identification Engine
International Symposium on Recent Advances in Intrusion Detection, 2018Several security applications rely on monitoring network traffic, which is increasingly becoming encrypted. In this work, we propose a pattern language to describe packet trains for the purpose of fine-grained identification of application-level events in encrypted network traffic, and demonstrate its expressiveness with case studies for distinguishing
Eva Papadogiannaki +3 more
openaire +2 more sources
An Encrypted Traffic Identification Method Based on RepVGG
Proceedings of the 2022 11th International Conference on Computing and Pattern Recognition, 2022With the emergence of encrypted traffic, more and more researchers use AI technology to improve the accuracy of traffic identification. However, machine learning needs to rely on human experience to extract features, and the training of deep learning ...
Kemeng Wang +3 more
openaire +2 more sources
VPN encrypted traffic identification model based on improved residual network
Third International Conference on Advanced Algorithms and Signal Image Processing (AASIP 2023), 2023Accurate classification of network traffic is the research basis for tasks such as network management, service quality optimization, abnormal traffic detection, etc.
Xiaodong Li +3 more
openaire +2 more sources
2023 International Conference on Computer Simulation and Modeling, Information Security (CSMIS), 2023
The identification of Malicious Encrypted Traffic (MET) is an important issue in the field of network security. This study proposes a new MET recognition system based on transport layer behavior characteristics, which is implemented through two steps ...
Kai Cheng +8 more
semanticscholar +1 more source
The identification of Malicious Encrypted Traffic (MET) is an important issue in the field of network security. This study proposes a new MET recognition system based on transport layer behavior characteristics, which is implemented through two steps ...
Kai Cheng +8 more
semanticscholar +1 more source
Deep learning based on byte sample entropy for VPN encrypted traffic identification
2022 5th International Conference on Advanced Electronic Materials, Computers and Software Engineering (AEMCSE), 2022Network traffic identification is important for traffic engineering, resource allocation, network management, attack detection and improving network QoS.
Yajuan Wang +3 more
semanticscholar +1 more source
PEAN: A Packet-level End-to-end Attentive Network for Encrypted Traffic Identification
2021 IEEE 23rd Int Conf on High Performance Computing & Communications; 7th Int Conf on Data Science & Systems; 19th Int Conf on Smart City; 7th Int Conf on Dependability in Sensor, Cloud & Big Data Systems & Application (HPCC/DSS/SmartCity/DependSys), 2021Encrypted traffic identification is important to maintain the cybersecurity. Recently, as the SSL/TLS encryption protocols are widely used in modern Internet environment, how to identify the encrypted traffic become a big challenge.
Peng Lin +4 more
semanticscholar +1 more source
Protocol Identification of Encrypted Network Traffic
2006 IEEE/WIC/ACM International Conference on Web Intelligence (WI 2006 Main Conference Proceedings)(WI'06), 2006New means of communication are constantly emerg- ing, some of which may constitute resource mis- use of an organisation?s network system. Identify- ing the protocols used is straight-forward when in- specting network logs, but we focus on the problem of identifying the underlying protocol present in an unknown TCP connection.
Matthew Gebski +2 more
openaire +1 more source
Encrypted Network Traffic Identification Based on 2D-CNN Model
2021 22nd Asia-Pacific Network Operations and Management Symposium (APNOMS), 2021Rapid development of the Internet has enabled explosive growth of various network traffic. How to classify and identify different categories of network traffic among these huge network traffic for cyberspace security has always been a hot research topic.
Yan Zhou +4 more
openaire +1 more source
Encrypted Network Traffic Analysis (ENTA) Platform: IMA VoIP Traffic Identification
NOMS 2025-2025 IEEE Network Operations and Management SymposiumThis paper introduces the Encrypted Network Traffic Analysis (ENTA) platform, a scalable AI-driven system de-signed for traffic analysis with support for identifying encrypted VoIP traffic generated by instant messaging applications (IMAs).
Julia Weber +8 more
openaire +2 more sources
Statistical identification of encrypted Web browsing traffic
Proceedings 2002 IEEE Symposium on Security and Privacy, 2005Encryption is often proposed as a tool for protecting the privacy of World Wide Web browsing. However, encryption-particularly as typically implemented in, or in concert with popular Web browsers-does not hide all information about the encrypted plaintext. Specifically, HTTP object count and sizes are often revealed (or at least incompletely concealed).
null Qixiang Sun +5 more
openaire +1 more source

