Results 1 to 10 of about 76,767 (261)

Malicious Traffic Identification with Self-Supervised Contrastive Learning [PDF]

open access: yesSensors, 2023
As the demand for Internet access increases, malicious traffic on the Internet has soared also. In view of the fact that the existing malicious-traffic-identification methods suffer from low accuracy, this paper proposes a malicious-traffic ...
Jin Yang   +4 more
doaj   +2 more sources

Skype Traffic Identification [PDF]

open access: yesIEEE GLOBECOM 2007-2007 IEEE Global Telecommunications Conference, 2007
Skype uses strong encryption to secure communications inside the whole Skype network. Clients choose communication ports randomly. Therefore traditional port based or payload based identification of Skype traffic is not feasible. In this paper we introduce a novel flow dynamics based identification method to discover Skype host and voice calls as well.
Perényi, Marcell Ádám   +3 more
openaire   +2 more sources

F-ACCUMUL: A Protocol Fingerprint and Accumulative Payload Length Sample-Based Tor-Snowflake Traffic-Identifying Framework

open access: yesApplied Sciences, 2023
Tor is widely used to protect users’ privacy, which is the most popular anonymous tool. Tor introduces multiple pluggable transports (PT) to help users avoid censorship.
Junqiang Chen, Guang Cheng, Hantao Mei
doaj   +1 more source

Identification of Malicious Encrypted Traffic Through Feature Fusion

open access: yesIEEE Access, 2023
The popularity of encrypted communication has grown due to increased security awareness and rapid internet development. End-to-end encryption can prevent data attacks but also poses new cybersecurity threats. Thus, identifying malicious encrypted traffic
Xianchun Zheng, Hui Li
doaj   +1 more source

A Comparative Study of Deep Learning and Decision Tree Based Ensemble Learning Algorithms for Network Traffic Identification

open access: yesTelfor Journal, 2022
In this paper, we apply Deep Learning (DL) and decision-tree-based ensemble learning algorithms to classify network traffic by application. Various Deep Learning (DL) models for network traffic identification have been presented, implemented and compared,
N. Nikolić   +2 more
doaj   +1 more source

Analysis of Driver-Passenger Relationship and Restoration of Accident Process Based on 3D Laser Scanning Technology [PDF]

open access: yesFayixue Zazhi, 2020
Objective To discuss the application of 3D laser scanner and computer technology in restoration of the accident scene and reconstruction of the accident process, as well as identification of the driver-passenger relationship.
ZHANG Xue, LI Sheng-dong, YU Yan-geng,et al.
doaj   +1 more source

BitTorrent traffic obfuscation: A chase towards semantic traffic identification [PDF]

open access: yes2012 IEEE 12th International Conference on Peer-to-Peer Computing (P2P), 2012
With the beginning of the 21st century emerging peer-to-peer networks ushered in a new era of large scale media exchange. Faced with ever increasing volumes of traffic, legal threats by copyright holders, and QoS demands of customers, network service providers are urged to apply traffic classification and shaping techniques.
Zink, Thomas, Waldvogel, Marcel
openaire   +2 more sources

IoT-Portrait: Automatically Identifying IoT Devices via Transformer with Incremental Learning

open access: yesFuture Internet, 2023
With the development of IoT, IoT devices have proliferated. With the increasing demands of network management and security evaluation, automatic identification of IoT devices becomes necessary.
Juan Wang, Jing Zhong, Jiangqi Li
doaj   +1 more source

Identification technique of cryptomining behavior based on traffic features

open access: yesFrontiers in Physics, 2023
Recently, the growth of blockchain technology and the economic benefits of cryptocurrencies have led to a proliferation of malicious cryptomining activities on the internet, resulting in significant losses for companies and institutions.
Lijian Dong   +4 more
doaj   +1 more source

RF-Based Traffic Detection and Identification [PDF]

open access: yes2012 IEEE Vehicular Technology Conference (VTC Fall), 2012
Road traffic congestion estimation is a critical function that affects both developed and developing countries alike. In this paper, we present Monitor as a novel RF-based traffic detection and identification system. Compared to the current approaches for traffic estimation, Monitor is low-cost, does not disrupt traffic during installation, works for ...
Amal Al-Husseiny, Moustafa Youssef
openaire   +1 more source

Home - About - Disclaimer - Privacy