Results 241 to 250 of about 25,989,787 (296)
Some of the next articles are maybe not open access.

TrafficLLM: Enhancing Large Language Models for Network Traffic Analysis with Generic Traffic Representation

arXiv.org
Machine learning (ML) powered network traffic analysis has been widely used for the purpose of threat detection. Unfortunately, their generalization across different tasks and unseen data is very limited.
Tianyu Cui   +6 more
semanticscholar   +1 more source

Critical traffic analysis on the tor network

ARES, 2020
Tor is a widely-used anonymity network with more than two million daily users. A special feature of Tor is the hidden service architecture. Hidden services are a popular method for anonymous communication or sharing web contents anonymously.
Florian Platzer   +2 more
semanticscholar   +1 more source

Brain-on-Switch: Towards Advanced Intelligent Network Data Plane via NN-Driven Traffic Analysis at Line-Speed

Symposium on Networked Systems Design and Implementation
The emerging programmable networks sparked significant research on Intelligent Network Data Plane (INDP), which achieves learning-based traffic analysis at line-speed. Prior art in INDP focus on deploying tree/forest models on the data plane.
Jinzhu Yan   +6 more
semanticscholar   +1 more source

FastFE: Accelerating ML-based Traffic Analysis with Programmable Switches

SPIN@SIGCOMM, 2020
Modern traffic analysis applications are usually designed to identify malicious behaviors by inferring sensitive information with machine learning (ML) techniques from network traffic, and they are of great importance to security with the growing use of ...
Jia-Ju Bai   +5 more
semanticscholar   +1 more source

Survey of Protocol Reverse Engineering Algorithms: Decomposition of Tools for Static Traffic Analysis

IEEE Communications Surveys and Tutorials, 2019
Knowledge about a network protocol to understand the communication between entities is necessary for vulnerability research, penetration testing, malware analysis, network reconnaissance, and network modeling.
Stephan Kleber, Lisa Maile, Frank Kargl
semanticscholar   +1 more source

Protecting IoT-environments against Traffic Analysis Attacks with Traffic Morphing

2019 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops), 2019
Traffic analysis attacks allow an attacker to infer sensitive information about users by analyzing network traffic of user devices. These attacks are passive in nature and are difficult to detect.
I. Hafeez, M. Antikainen, Sasu Tarkoma
semanticscholar   +1 more source

Traffic Analysis and Solutions

2013
Urban mobility offers a unique opportunity to ensure development and radical improvement to the quality of urban life in the Multan City center. The traditional approach to transport planning usually aims only at solving technical issues, finding the solutions within its own discipline.
Donato V., Camolese S., Terenzi A.
openaire   +1 more source

ViCCU® Traffic Analysis

2006 2nd International Conference on Information & Communication Technologies, 2006
This paper presents the results of a detailed analysis of the traffic flows in operation between the two sites of a ViCCU® telehealth system. The traffic characteristics for each direction were measured separately. The captured data are treated with sampled rate analysis and detailed instantaneous packet rate analysis. Specifically, the results provide
null Ren Ping Liu   +2 more
openaire   +1 more source

Game traffic analysis

Proceedings of the 15th International Workshop on Network and Operating Systems Support for Digital Audio and Video, 2005
Online gaming is one of the most profitable businesses over the Internet. Among all genres of the online games, the popularity of the MMORPG (Massive Multiplayer Online Role Playing Games) is especially prominent in Asia. Opting for a better understanding of the game traffic and the economic well being of the Internet, we analyze a 1,356-million-packet
Kuan-Ta Chen   +3 more
openaire   +1 more source

Detecting Drones Status via Encrypted Traffic Analysis

WiseML@WiSec, 2019
We propose a methodology to detect the current status of a powered-on drone (flying or at rest), leveraging just the communication traffic exchanged between the drone and its Remote Controller (RC).
Savio Sciancalepore   +3 more
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy