Results 171 to 180 of about 36,419 (228)
Some of the next articles are maybe not open access.

Protocol-independent identification of encrypted video traffic sources using traffic analysis

2016 IEEE International Conference on Communications (ICC), 2016
This paper presents a mechanism to use Traffic Analysis (TA) for identifying sources of tunneled video streaming traffic. The key idea is to probe encrypted and tunneled video streaming traffic at a client-side firewall so that the firewall can identify the traffic source using traffic analysis, and block or throttle traffic from that particular source.
Yan Shi, Subir Biswas
openaire   +1 more source

Fusion of Federated Learning and Improved ResNeXt for Encrypted Traffic Identification

Proceedings of the 4th Asia-Pacific Artificial Intelligence and Big Data Forum
To solve the problem of low efficiency in extracting features and key protocol fields in traditional machine learning-based classification techniques and the vulnerability to sensitive data leakage, federated learning and improved ResNeXt-based encrypted
Junling Wang   +3 more
semanticscholar   +1 more source

App identification based on encrypted multi-smartphone sources traffic fingerprints

Computer Networks, 2021
Abstract The smartphone app identification technology based on traffic fingerprints has begun to play an important role in monitoring malware and assisting network management with the smartphone security issues getting more attention. Smartphones connected to the Internet are often produced by multiple manufacturers, belong to multiple models and use
Qiuning Ren, Chao Yang, Jianfeng Ma
openaire   +1 more source

Encrypted Traffic Identification Based on N-gram Entropy and Cumulative Sum Test

International Conference of Future Internet, 2018
Since existing methods using entropy are less effective in characterizing encrypted traffic, this paper proposes an encrypted traffic identification method based on n-gram entropy and cumulative sum.
Guang Cheng, Ying Hu
semanticscholar   +1 more source

A Robust and Accurate Encrypted Video Traffic Identification Method via Graph Neural Network

International Conference on Computer Supported Cooperative Work in Design, 2023
The explosive growth of video traffic has brought major challenges for network providers to improve user experience. On account of traffic encryption, network providers need to identify encrypted video traffic first before adopting optimization ...
Zhao Li   +5 more
semanticscholar   +1 more source

SD-Transformer: A System-Level Denoising Transformer for Encrypted Traffic Behavior Identification

Global Communications Conference, 2023
Encrypted behavior identification is crucial in ensuring network security. Most existing solutions in this area recognize behavior by observing encrypted traffic patterns between users and applications.
Yizhuo Zhao   +5 more
semanticscholar   +1 more source

Source identification of encrypted video traffic in the presence of heterogeneous network traffic

Computer Communications, 2018
Abstract This paper uses Traffic Analysis (TA) for identifying sources of tunneled video streaming traffic. The key idea is to examine encrypted and tunneled video streaming traffic at a Soft-Margin Firewall (SMFW) that is located near the streaming client in order to identify undesirable traffic sources and to block or throttle traffic from such ...
Yan Shi, Arun Ross, Subir Biswas
openaire   +1 more source

Towards real-time processing for application identification of encrypted traffic

2014 International Conference on Computing, Networking and Communications (ICNC), 2014
Application identification in the middle is one of key challenges for network operators to manage application based traffic and policy controls in the Internet. However, it is becoming harder according to the increase of end-to-end encrypted traffic in which we hardly read application specific information from packets.
Yuichi Kumano   +4 more
openaire   +1 more source

Analysis of encrypted wireless traffic for identification of IoT devices

2025 IEEE World AI IoT Congress (AIIoT)
With the ever increasing presence of Internet of Things (IoT) devices in smart home and industrial applications, it is important to ensure the same level of security for these devices as it is for traditional network endpoints.
Natalie Nakhla   +6 more
openaire   +2 more sources

Genetic optimization and hierarchical clustering applied to encrypted traffic identification

2011 IEEE Symposium on Computational Intelligence in Cyber Security (CICS), 2011
An important part of network management requires the accurate identification and classification of network traffic for decisions regarding bandwidth management, quality of service, and security. This work explores the use of a Multi-Objective Genetic Algorithm (MOGA) for both, feature selection and cluster count optimization, for an unsupervised ...
Carlos Bacquet   +2 more
openaire   +1 more source

Home - About - Disclaimer - Privacy