Encrypted traffic identification scheme based on sliding window and randomness features
With the development of information technology, network security has increasingly become a focal point for users and organizations, and encrypted data transmission has gradually become mainstream. This trend has driven the proportion of encrypted traffic
Jiachi LIU, Boyu KUANG, Mang SU, Yaqian XU, Anmin FU
doaj +3 more sources
Review of Key Technologies of Incremental Intrusion Detection for Network Encrypted Traffic [PDF]
As cyber threats continue to intensify, the concealment of encrypted traffic attacks and the suddenness of zero-day exploits have significantly reduced the detection efficiency of traditional intrusion detection systems.
CHEN Liangchen, FU Deyin, LIU Baoxu, GAO Shu, ZHANG Xuyao
doaj +1 more source
Realtime Encrypted Traffic Identification using Machine Learning
Accurate network traffic identification plays important roles in many areas such as traffic engineering, QoS and intrusion detection etc. The emergence of many new encrypted applications which use dynamic port numbers and masquerading techniques causes the most challenging problem in network traffic identification field.
Chengjie Gu, Shunyi Zhang, Yanfei Sun
openaire +1 more source
With the rapid growth of the encrypted network traffic, the identification to it becomes a hot topic in information security. Since the existing methods have difficulties in identifying the application which the encrypted traffic belongs to, a new ...
Jiangtao Zhai +4 more
semanticscholar +1 more source
Scheme for identifying malware traffic with TLS data based on machine learning
Based on analyzing the characteristics of transport layer security (TLS) protocol,a distributed automation malicious traffic detecting system based on machine learning was designed.The characteristics of encrypted malware traffic from TLS data,observable
Ziming LUO, Shubin XU, Xiaodong LIU
doaj +3 more sources
A Practical Website Fingerprinting Attack via CNN-Based Transfer Learning
Website fingerprinting attacks attempt to apply deep learning technology to identify websites corresponding to encrypted traffic data. Unfortunately, to the best of our knowledge, once the total number of encrypted traffic data becomes insufficient, the ...
Tianyao Pan, Zejia Tang, Dawei Xu
doaj +1 more source
IPSec VPN Closure Detection Method Based on Side-channel Features [PDF]
IPSec VPN can be divided into closed networks and open networks according to different application scenarios.Closed networks are generally used to customize virtual private networks,and open network proxies are commonly used to avoid network auditing ...
SUN Yunxiao, LI Jun, WANG Bailing
doaj +1 more source
Identification of Mobile Service Type of Encrypted Traffic Based on Fusion of Inception andSE-Attention [PDF]
Mobile devices usually access WLAN and rely on WiFi encryption protocol to encrypt data link layer traffic in the network to maintain communication security.However,existing encrypted traffic identification methods mainly analyze traffic loads at the ...
WANG Yijing, WANG Qingxian, DING Dazhao, YAN Tingju, CAO Yan
doaj +1 more source
Mobile app identification for encrypted network flows by traffic correlation
Mobile application (simply “app”) identification at a per-flow granularity is vital for traffic engineering, network management, and security practices. However, uncertainty is caused by a growing fraction of encrypted traffic such as Hypertext Transfer ...
Gaofeng He +3 more
doaj +1 more source
Encrypted Network Traffic Classification Using Deep and Parallel Network-in-Network Models
Network traffic classification aims to recognize different application or traffic types by analyzing received data packets. This paper presents a neural network model with deep and parallel network-in-network (NIN) structures for classifying encrypted ...
Zhiyong Bu +4 more
doaj +1 more source

