Results 161 to 170 of about 36,419 (228)
Some of the next articles are maybe not open access.

A Fingerprint Enhancement and Second-Order Markov Chain Based Malicious Encrypted Traffic Identification Scheme

International Conference on Computing and Artificial Intelligence, 2020
Malicious encrypted traffic poses great threat to cyber security owing to encryption and the ability to bypass traditional traffic detection schemes.
Daichong Chao
semanticscholar   +1 more source

Application identification from encrypted traffic based on characteristic changes by encryption

2011 IEEE International Workshop Technical Committee on Communications Quality and Reliability (CQR), 2011
Application identification is paid much attention by network operators to manage application based traffic control in the Internet. However, encryption is one of the factors to make application identification difficult, because it is so hard to infer the original (unencrypted) packets from encrypted packets.
Yohei Okada   +4 more
openaire   +1 more source

Packet Bytes-Based Abnormal Encrypted Proxy Traffic Identification

2024 IEEE 30th International Conference on Telecommunications (ICT)
With the increasing concern about the leakage of user privacy, encryption proxies have been widely used by Internet service providers as a means to protect users' privacy.
Shunliang Zhang, Hongce Zhao, Zuwei Fan
openaire   +2 more sources

A Classification and Identification Technology of TLS Encrypted Traffic Applications

2021 IEEE 4th International Conference on Big Data and Artificial Intelligence (BDAI), 2021
In the paper, regarding the transport layer security encrypted traffic of the Internet, the application program identification and application protocol classification technology of encrypted traffic based on hidden Markov model and long short-term memory networks are studied, and the encrypted traffic detection prototype is constructed.
Yue Zhao   +6 more
openaire   +1 more source

FlowMamba-FSCIL: A Few-Shot Class-Incremental Learning Framework for Adaptive Encrypted Traffic Identification

2025 IEEE 6th International Conference on Computer, Big Data, Artificial Intelligence (ICCBD+AI)
The rapid evolution of network applications necessitates that models for identifying encrypted traffic continuously adapt to new categories with limited labeled samples while mitigating the risk of catastrophic forgetting. To address this challenge, this
Yao Liu   +5 more
semanticscholar   +1 more source

L-GraphSAGE: A Graph Neural Network-Based Approach for IoV Application Encrypted Traffic Identification

Electronics
Recently, with a crucial role in developing smart transportation systems, the Internet of Vehicles (IoV), with all kinds of in-vehicle devices, has undergone significant advancement for autonomous driving, in-vehicle infotainment, etc.
Shihe Zhang   +6 more
semanticscholar   +1 more source

Identification of Smartphone Applications by Encrypted Traffic Analysis

2019 16th IEEE Annual Consumer Communications & Networking Conference (CCNC), 2019
The requirements of smartphone users have shifted from the quality of service (i.e., throughput) to the quality of experience. Also, the amount of encrypted traffic has increased to protect personal information. Therefore, to provide a quality mobile network experience for smartphone users, network operators need to identify applications from the ...
Anan Sawabe, Takanori Iwai, Kozo Satoda
openaire   +1 more source

GETRF: A General Framework for Encrypted Traffic Identification With Robust Representation Based on Datagram Structure

IEEE Transactions on Cognitive Communications and Networking
Identifying encrypted traffic is essential for network management, but it becomes increasingly challenging as more and more users adopt encryption protocols and traffic defense mechanisms for data privacy.
Xiaojuan Wang   +4 more
semanticscholar   +1 more source

Accurate Decentralized Application Identification via Encrypted Traffic Analysis Using Graph Neural Networks

IEEE Transactions on Information Forensics and Security, 2021
Decentralized Applications (DApps) are increasingly developed and deployed on blockchain platforms such as Ethereum. DApp fingerprinting can identify users’ visits to specific DApps by analyzing the resulting network traffic, revealing much sensitive ...
Meng Shen   +4 more
semanticscholar   +1 more source

Encrypted Traffic Identification in Power IoT based on CNN with Batch Normalization

2024 6th International Conference on Electrical Engineering and Control Technologies (CEECT)
With the rapid development of new power system, encrypted traffic in power IoT has surged. How to effectively identify encrypted traffic has become a new challenge for industrial control security detection.
Menglin Li   +5 more
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy