Results 11 to 20 of about 4,251 (194)

Malicious Encryption Traffic Detection Based on NLP [PDF]

open access: yesSecurity and Communication Networks, 2021
The development of Internet and network applications has brought the development of encrypted communication technology. But on this basis, malicious traffic also uses encryption to avoid traditional security protection and detection. Traditional security protection and detection methods cannot accurately detect encrypted malicious traffic.
Hao Yang   +3 more
openaire   +1 more source

Malicious Traffic Detection Combining Features of Packet Payload and Stream Fingerprint [PDF]

open access: yesJisuanji gongcheng, 2020
The data sets for the detection of malicious traffic by the SSL/TLS protocol are single-sourced.Traditional detection methods take the quintuple feature of network traffic as the main feature for classification,which reduces the accuracy of malicious ...
HU Bin, ZHOU Zhihong, YAO Lihong, LI Jianhua
doaj   +1 more source

Intrusion detection model based on capsule network

open access: yesXi'an Gongcheng Daxue xuebao, 2023
In order to solve the problems of low detection accuracy and less attention of vairous malicious traffic identification in traditional intrusion detection system (IDS) in the face of massive data mixed with various malicious traffic, an intrusion ...
ZHAO Xu, WANG Xu, ZHANG Xin
doaj   +1 more source

Blacklist-based malicious IP traffic detection [PDF]

open access: yes2015 Global Conference on Communication Technologies (GCCT), 2015
At present malicious software or malware has increased considerably to form a serious threat to Internet infrastructure. It becomes the major source of most malicious activities on the Internet such as direct attacks, (distributed) denial-of-service (DOS) activities and scanning.
Ghafir Ibrahim, Přenosil Václav
openaire   +1 more source

Scheme for identifying malware traffic with TLS data based on machine learning

open access: yes网络与信息安全学报, 2020
Based on analyzing the characteristics of transport layer security (TLS) protocol,a distributed automation malicious traffic detecting system based on machine learning was designed.The characteristics of encrypted malware traffic from TLS data,observable
Ziming LUO, Shubin XU, Xiaodong LIU
doaj   +3 more sources

Malicious Encrypted Traffic Detection Integrating One-Dimensional Inception Structure and ViT [PDF]

open access: yesJisuanji gongcheng, 2023
In Internet encryption, traditional malicious traffic detection performs poorly in distinguishing encrypted traffic.To detect malicious traffic in encrypted traffic better, this paper designs a malicious encryption traffic detection model integrating a ...
SUN Yi, GAO Jian, GU Yijun
doaj   +1 more source

GCN-ETA: High-Efficiency Encrypted Malicious Traffic Detection [PDF]

open access: yesSecurity and Communication Networks, 2022
Encrypted network traffic is the principal foundation of secure network communication, and it can help ensure the privacy and integrity of confidential information. However, it hides the characteristics of the data, increases the difficulty of detecting malicious traffic, and protects such malicious behavior.
Juan Zheng, Zhiyong Zeng, Tao Feng
openaire   +1 more source

A deep‐learning‐ and reinforcement‐learning‐based system for encrypted network malicious traffic detection

open access: yesElectronics Letters, 2021
Traditional network intrusion detection methods lack the ability of automatic feature extraction for encrypted network malicious traffic, and thus, the detection rates are low.
Jin Yang   +4 more
doaj   +1 more source

Deep-Forest-Based Encrypted Malicious Traffic Detection

open access: yesElectronics, 2022
The SSL/TLS protocol is widely used in data encryption transmission. Aiming at the problem of detecting SSL/TLS-encrypted malicious traffic with small-scale and unbalanced training data, a deep-forest-based detection method called DF-IDS is proposed in this paper.
Xueqin Zhang   +5 more
openaire   +1 more source

Model of the malicious traffic classification based on hypergraph neural network

open access: yes网络与信息安全学报, 2023
As the use and reliance on networks continue to grow, the prevalence of malicious network traffic poses a significant challenge in the field of network security.Cyber attackers constantly seek new ways to infiltrate systems, steal data, and disrupt ...
Wenbo ZHAO, Zitong MA, Zhe YANG
doaj   +3 more sources

Home - About - Disclaimer - Privacy