Results 31 to 40 of about 4,251 (194)

Study on SSL/TLS Encrypted Malicious Traffic Detection Algorithm Based on Graph Neural Networks [PDF]

open access: yesJisuanji kexue
In order to achieve precise detection of SSL/TLS encrypted malicious traffic,a graph neural network-based model for malicious encrypted traffic detection is proposed,to address the issue of excessive reliance on expert experience in traditional machine ...
TANG Ying, WANG Baohui
doaj   +1 more source

Detecting malicious IoT traffic using Machine Learning techniques

open access: yesRevista Română de Informatică și Automatică, 2023
Internet of Things (IoT) generates huge amount of data, that needs to communicate between the IoT enabled devices. These communications are vulnerable to security attacks and are malicious enough to cause harm to connected devices. The invasive communication and security breaches have to be identified and should be dealt with in order not to cause ...
Bhuvana JAYARAMAN   +3 more
openaire   +2 more sources

Multi-feature fusion based encrypted malicious traffic detection method for coal mine network

open access: yesGong-kuang zidonghua, 2022
The coal mine network is faced with the threat of malicious traffic encrypted by the transport layer security protocol (TLS) generated by malicious software and the high false alarm rate of encrypted traffic during detection.
HUO Yuehua, ZHAO Faqi, WU Wenhao
doaj   +1 more source

Integrated Fuzzy Based Computational Mechanism for the Selection of Effective Malicious Traffic Detection Approach

open access: yesIEEE Access, 2021
A mechanism to effectively detect malicious traffic in the present context where new cyber criminals and threatening actors are emerging every day, has become a compelling need.
Sultan H. Almotiri
doaj   +1 more source

Tor Multipath Selection Based on Threaten Awareness [PDF]

open access: yesJisuanji kexue
With the development and application of machine learning and deep learning,attackers can conduct traffic analysis on malicious nodes and malicious AS on Tor user links,thus carrying out de-anonymization attacks on Tor users.At present,one of the common ...
CHEN Shangyu, HU Hongchao, ZHANG Shuai, ZHOU Dacheng, YANG Xiaohan
doaj   +3 more sources

Detection of randomized bot command and control traffic on an end-point host

open access: yesAlexandria Engineering Journal, 2016
Bots are malicious software entities that unobtrusively infect machines and silently engage in activities ranging from data stealing to cyber warfare. Most recent bot detection methods rely on regularity of bot command and control (C&C) traffic for bot ...
B. Soniya, M. Wilscy
doaj   +1 more source

Distributed Malicious Traffic Detection

open access: yesElectronics
With the wide deployment of edge devices, distributed network traffic data are rapidly increasing. Traditional detection methods for malicious traffic rely on centralized training, in which a single server is often used to aggregate private traffic data from edge devices, so as to extract and identify features.
Ying Liu   +3 more
openaire   +1 more source

Traffic-based Malicious Switch Detection in SDN

open access: yesInternational Journal of Security and Its Applications, 2014
In Software Defined Networking (SDN) architecture, the control plane is separated from the data plane. On one hand, OpenFlow switches can only store and forward packets, which leaves all decisions to be made by the controller. On the other hand, the controller has a global view over the SDN. But if any switch is captured by an adversary, it may mislead
Xiaodong Du   +3 more
openaire   +1 more source

Malicious Domain Detection Based on Traffic Similarity

open access: yesDEStech Transactions on Computer Science and Engineering, 2017
Domain name system is an important resource in the Internet. Malicious domain detection techniques are used to find the malicious domains which are designed for malicious behaviors. The paper analyzes the existing malicious domain detection techniques and then proposes a new malicious domain detection technique based on traffic similarity.
JIANPING HU   +3 more
openaire   +2 more sources

Webshell malicious traffic detection method based on multi-feature fusion

open access: yes网络与信息安全学报, 2021
Webshell is the most common malicious backdoor program for persistent control of Web application systems, which poses a huge threat to the safe operation of Web servers.For most Webshell detection method based on the request packet data for training, the
Yuan LI   +3 more
doaj   +3 more sources

Home - About - Disclaimer - Privacy