Results 11 to 20 of about 4,251 (194)
Malicious Encryption Traffic Detection Based on NLP [PDF]
The development of Internet and network applications has brought the development of encrypted communication technology. But on this basis, malicious traffic also uses encryption to avoid traditional security protection and detection. Traditional security protection and detection methods cannot accurately detect encrypted malicious traffic.
Hao Yang +3 more
openaire +1 more source
Malicious Traffic Detection Combining Features of Packet Payload and Stream Fingerprint [PDF]
The data sets for the detection of malicious traffic by the SSL/TLS protocol are single-sourced.Traditional detection methods take the quintuple feature of network traffic as the main feature for classification,which reduces the accuracy of malicious ...
HU Bin, ZHOU Zhihong, YAO Lihong, LI Jianhua
doaj +1 more source
Intrusion detection model based on capsule network
In order to solve the problems of low detection accuracy and less attention of vairous malicious traffic identification in traditional intrusion detection system (IDS) in the face of massive data mixed with various malicious traffic, an intrusion ...
ZHAO Xu, WANG Xu, ZHANG Xin
doaj +1 more source
Blacklist-based malicious IP traffic detection [PDF]
At present malicious software or malware has increased considerably to form a serious threat to Internet infrastructure. It becomes the major source of most malicious activities on the Internet such as direct attacks, (distributed) denial-of-service (DOS) activities and scanning.
Ghafir Ibrahim, Přenosil Václav
openaire +1 more source
Scheme for identifying malware traffic with TLS data based on machine learning
Based on analyzing the characteristics of transport layer security (TLS) protocol,a distributed automation malicious traffic detecting system based on machine learning was designed.The characteristics of encrypted malware traffic from TLS data,observable
Ziming LUO, Shubin XU, Xiaodong LIU
doaj +3 more sources
Malicious Encrypted Traffic Detection Integrating One-Dimensional Inception Structure and ViT [PDF]
In Internet encryption, traditional malicious traffic detection performs poorly in distinguishing encrypted traffic.To detect malicious traffic in encrypted traffic better, this paper designs a malicious encryption traffic detection model integrating a ...
SUN Yi, GAO Jian, GU Yijun
doaj +1 more source
GCN-ETA: High-Efficiency Encrypted Malicious Traffic Detection [PDF]
Encrypted network traffic is the principal foundation of secure network communication, and it can help ensure the privacy and integrity of confidential information. However, it hides the characteristics of the data, increases the difficulty of detecting malicious traffic, and protects such malicious behavior.
Juan Zheng, Zhiyong Zeng, Tao Feng
openaire +1 more source
Traditional network intrusion detection methods lack the ability of automatic feature extraction for encrypted network malicious traffic, and thus, the detection rates are low.
Jin Yang +4 more
doaj +1 more source
Deep-Forest-Based Encrypted Malicious Traffic Detection
The SSL/TLS protocol is widely used in data encryption transmission. Aiming at the problem of detecting SSL/TLS-encrypted malicious traffic with small-scale and unbalanced training data, a deep-forest-based detection method called DF-IDS is proposed in this paper.
Xueqin Zhang +5 more
openaire +1 more source
Model of the malicious traffic classification based on hypergraph neural network
As the use and reliance on networks continue to grow, the prevalence of malicious network traffic poses a significant challenge in the field of network security.Cyber attackers constantly seek new ways to infiltrate systems, steal data, and disrupt ...
Wenbo ZHAO, Zitong MA, Zhe YANG
doaj +3 more sources

