Results 31 to 40 of about 36,419 (228)

Encrypted traffic identification scheme based on sliding window and randomness features

open access: yes网络与信息安全学报
With the development of information technology, network security has increasingly become a focal point for users and organizations, and encrypted data transmission has gradually become mainstream. This trend has driven the proportion of encrypted traffic
Jiachi LIU, Boyu KUANG, Mang SU, Yaqian XU, Anmin FU
doaj   +3 more sources

Review of Key Technologies of Incremental Intrusion Detection for Network Encrypted Traffic [PDF]

open access: yesJisuanji gongcheng
As cyber threats continue to intensify, the concealment of encrypted traffic attacks and the suddenness of zero-day exploits have significantly reduced the detection efficiency of traditional intrusion detection systems.
CHEN Liangchen, FU Deyin, LIU Baoxu, GAO Shu, ZHANG Xuyao
doaj   +1 more source

Realtime Encrypted Traffic Identification using Machine Learning

open access: yesJournal of Software, 2011
Accurate network traffic identification plays important roles in many areas such as traffic engineering, QoS and intrusion detection etc. The emergence of many new encrypted applications which use dynamic port numbers and masquerading techniques causes the most challenging problem in network traffic identification field.
Chengjie Gu, Shunyi Zhang, Yanfei Sun
openaire   +1 more source

An Encrypted Traffic Identification Scheme Based on the Multilevel Structure and Variational Automatic Encoder

open access: yesSecur. Commun. Networks, 2020
With the rapid growth of the encrypted network traffic, the identification to it becomes a hot topic in information security. Since the existing methods have difficulties in identifying the application which the encrypted traffic belongs to, a new ...
Jiangtao Zhai   +4 more
semanticscholar   +1 more source

Scheme for identifying malware traffic with TLS data based on machine learning

open access: yes网络与信息安全学报, 2020
Based on analyzing the characteristics of transport layer security (TLS) protocol,a distributed automation malicious traffic detecting system based on machine learning was designed.The characteristics of encrypted malware traffic from TLS data,observable
Ziming LUO, Shubin XU, Xiaodong LIU
doaj   +3 more sources

A Practical Website Fingerprinting Attack via CNN-Based Transfer Learning

open access: yesMathematics, 2023
Website fingerprinting attacks attempt to apply deep learning technology to identify websites corresponding to encrypted traffic data. Unfortunately, to the best of our knowledge, once the total number of encrypted traffic data becomes insufficient, the ...
Tianyao Pan, Zejia Tang, Dawei Xu
doaj   +1 more source

IPSec VPN Closure Detection Method Based on Side-channel Features [PDF]

open access: yesJisuanji kexue, 2023
IPSec VPN can be divided into closed networks and open networks according to different application scenarios.Closed networks are generally used to customize virtual private networks,and open network proxies are commonly used to avoid network auditing ...
SUN Yunxiao, LI Jun, WANG Bailing
doaj   +1 more source

Identification of Mobile Service Type of Encrypted Traffic Based on Fusion of Inception andSE-Attention [PDF]

open access: yesJisuanji kexue
Mobile devices usually access WLAN and rely on WiFi encryption protocol to encrypt data link layer traffic in the network to maintain communication security.However,existing encrypted traffic identification methods mainly analyze traffic loads at the ...
WANG Yijing, WANG Qingxian, DING Dazhao, YAN Tingju, CAO Yan
doaj   +1 more source

Mobile app identification for encrypted network flows by traffic correlation

open access: yesInternational Journal of Distributed Sensor Networks, 2018
Mobile application (simply “app”) identification at a per-flow granularity is vital for traffic engineering, network management, and security practices. However, uncertainty is caused by a growing fraction of encrypted traffic such as Hypertext Transfer ...
Gaofeng He   +3 more
doaj   +1 more source

Encrypted Network Traffic Classification Using Deep and Parallel Network-in-Network Models

open access: yesIEEE Access, 2020
Network traffic classification aims to recognize different application or traffic types by analyzing received data packets. This paper presents a neural network model with deep and parallel network-in-network (NIN) structures for classifying encrypted ...
Zhiyong Bu   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy