Results 181 to 190 of about 36,419 (228)
Some of the next articles are maybe not open access.
Fast Identification of Encrypted Traffic via Large-Scale Sparse Screening
2017 Fifth International Conference on Advanced Cloud and Big Data (CBD), 2017Encrypted traffic identification has great significance to regulate illegal data, detect network attacks and protect users' information. Here we propose a novel approach to fast identify encrypted traffic via large-scale sparse screening. We investigate randomness features using Lasso regression to select the most relevant features.
Peng Meng, Guopeng Zhou, Juan Meng
openaire +1 more source
Pioneer: Encrypted Video Traffic Identification for Mixed Transmission of Video-Audio Segments
IEEE International Conference on Multimedia and ExpoThe spread of harmful content via video has made video traffic identification crucial for network regulation. In the new transmission mode, audio and video segments are mixed to combine into video chunks.
Weitao Tang +5 more
semanticscholar +1 more source
Classification and Identification of Encrypted Network Traffic Based on BP Neural Network Models
2025 IEEE 7th International Conference on Civil Aviation Safety and Information Technology (ICCASIT)In recent years, network traffic encryption has become a necessary means to protect user privacy and data security. How to accurately and quickly achieve precise classification and threat identification of encrypted traffic while taking into account user
H. Shen
semanticscholar +1 more source
FPGA-based encrypted network traffic identification at 100 Gbit/s
2016 International Conference on ReConFigurable Computing and FPGAs (ReConFig), 2016Network traffic monitoring is becoming increasingly hard to manage due to the ever-growing speed of network links. At 100 Gbit/s, the huge volume of data makes it very difficult to perform online analyses or to store traffic for subsequent forensic investigations.
Ruiz, Mario +3 more
openaire +1 more source
Identification of Application in Encrypted Traffic by Using Machine Learning
2017Identification of Internet protocol from raw network traffic plays a crucial role at maintaining and improving the security of back-end and front-end computer systems. A significant amount of research work is carried out while exploiting a variety of identification techniques.
Pektas, Abdurrahman, ACARMAN, TANKUT
openaire +2 more sources
A Generalization-Enhanced Method for Encrypted Proxy Traffic Identification Based on Autoencoder
2024 2nd International Conference On Mobile Internet, Cloud Computing and Information Security (MICCIS)While encrypted proxy services like Shadowsocks and Vmess safeguard user privacy by encrypting traffic data, they also provide anonymity tools for cybercriminals, increasing the difficulty of regulating and combating activities such as online fraud and ...
Nanxin Zhou +3 more
semanticscholar +1 more source
Proceedings of the 11th International Conference on Computer Engineering and Networks, 2021
Yonghua Huo +4 more
semanticscholar +1 more source
Yonghua Huo +4 more
semanticscholar +1 more source
Malicious Encrypted Traffic Identification Based on Four-Tuple Feature and Deep Learning
International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2021Kunlin Li, Baojiang Cui
semanticscholar +1 more source
International Conference on Parallel and Distributed Systems
With the widespread use of cryptocurrencies and the development of anonymity network technology, how to effectively identify cryptocurrency transactions through anonymity networks such as Tor has become a major challenge in cybersecurity.
Xiangdong Kong +4 more
semanticscholar +1 more source
With the widespread use of cryptocurrencies and the development of anonymity network technology, how to effectively identify cryptocurrency transactions through anonymity networks such as Tor has become a major challenge in cybersecurity.
Xiangdong Kong +4 more
semanticscholar +1 more source
MFSI: Multi-flow based service identification for encrypted network traffic
Computer NetworksBiying Wang +6 more
openaire +2 more sources

