Results 11 to 20 of about 36,419 (228)
An encrypted traffic identification method based on multi-scale feature fusion
As data privacy issues become more and more sensitive, increasing numbers of websites usually encrypt traffic when transmitting it. This method can largely protect privacy, but it also brings a huge challenge. Aiming at the problem that encrypted traffic
Peng Zhu +4 more
doaj +2 more sources
Towards identification of network applications in encrypted traffic
Abstract Network traffic monitoring for security threat detection and network performance management is challenging due to the encryption of most communications. This article addresses the problem of identifying network applications associated with Transport Layer Security (TLS) connections.
Burgetová, Ivana +2 more
openaire +3 more sources
Edge Intelligence Based Identification and Classification of Encrypted Traffic of Internet of Things
A detection model of Internet of Things encrypted traffic based on edge intelligence is proposed in the paper, which can reduce the communication times of distributed Internet of Things gateways in the process of edge intelligence as well as the ...
Yue Zhao +5 more
doaj +1 more source
Robust Smartphone App Identification via Encrypted Network Traffic Analysis [PDF]
The apps installed on a smartphone can reveal much information about a user, such as their medical conditions, sexual orientation, or religious beliefs. Additionally, the presence or absence of particular apps on a smartphone can inform an adversary who is intent on attacking the device.
Taylor, Vincent F. +3 more
openaire +4 more sources
With the improvement of users’ security awareness and the development of encryption technology, encrypted traffic has become an important part of network traffic, and identifying encrypted traffic has become an important part of network traffic ...
Guozhen SHI +3 more
doaj +3 more sources
SAE-based Encrypted Traffic Identification Method [PDF]
To solve the problem that encrypted traffic identification methods based on machine learning are low in accuracy and time-consuming and costly in feature extraction and selection,this paper proposes a Stacked Autoencoder (SAE)-based encrypted traffic ...
WANG Pan,CHEN Xuejiao
doaj +1 more source
A Network Application Identification Method for Encrypted Traffic [PDF]
For the management and control of network traffic,this paper proposes a parallel identification method for encrypted traffic based on the interaction fields of the Secure Socket Layer(SSL) protocol and Hidden Markov Model(HMM) with multiple inputs and a ...
SUN Zhongjun, ZHAI Jiangtao
doaj +1 more source
VoIP Traffic Detection in Tunneled and Anonymous Networks Using Deep Learning
Network management is facing a great challenge to analyze and identify encrypted network traffic with specific applications and protocols. A significant number of network users applying different encryption techniques to network applications and services
Faiz Ul Islam +3 more
doaj +1 more source
CNN-based Encrypted C&C Communication Traffic Identification Method [PDF]
In order to achieve accurate identification of malware encrypted C&C communication traffic,this paper analyzes the https communication process of normal Webpage browsing access and C&C communication,discovers the server independence feature of ...
CHENG Hua, XIE Jinxin, CHEN Lihuang
doaj +1 more source
Encrypted Traffic Identification by Fusing Softmax Classifier with Its Angular Margin Variant
SUMMARY Encrypted tra ffi c identification is to predict tra ffi c types of encrypted tra ffi c. A deep residual convolution network is proposed for this task.
Lin Yan +3 more
semanticscholar +1 more source

