Results 1 to 10 of about 76,767 (261)
Malicious Traffic Identification with Self-Supervised Contrastive Learning [PDF]
As the demand for Internet access increases, malicious traffic on the Internet has soared also. In view of the fact that the existing malicious-traffic-identification methods suffer from low accuracy, this paper proposes a malicious-traffic ...
Jin Yang +4 more
doaj +2 more sources
Skype Traffic Identification [PDF]
Skype uses strong encryption to secure communications inside the whole Skype network. Clients choose communication ports randomly. Therefore traditional port based or payload based identification of Skype traffic is not feasible. In this paper we introduce a novel flow dynamics based identification method to discover Skype host and voice calls as well.
Perényi, Marcell Ádám +3 more
openaire +2 more sources
Tor is widely used to protect users’ privacy, which is the most popular anonymous tool. Tor introduces multiple pluggable transports (PT) to help users avoid censorship.
Junqiang Chen, Guang Cheng, Hantao Mei
doaj +1 more source
Identification of Malicious Encrypted Traffic Through Feature Fusion
The popularity of encrypted communication has grown due to increased security awareness and rapid internet development. End-to-end encryption can prevent data attacks but also poses new cybersecurity threats. Thus, identifying malicious encrypted traffic
Xianchun Zheng, Hui Li
doaj +1 more source
In this paper, we apply Deep Learning (DL) and decision-tree-based ensemble learning algorithms to classify network traffic by application. Various Deep Learning (DL) models for network traffic identification have been presented, implemented and compared,
N. Nikolić +2 more
doaj +1 more source
Analysis of Driver-Passenger Relationship and Restoration of Accident Process Based on 3D Laser Scanning Technology [PDF]
Objective To discuss the application of 3D laser scanner and computer technology in restoration of the accident scene and reconstruction of the accident process, as well as identification of the driver-passenger relationship.
ZHANG Xue, LI Sheng-dong, YU Yan-geng,et al.
doaj +1 more source
BitTorrent traffic obfuscation: A chase towards semantic traffic identification [PDF]
With the beginning of the 21st century emerging peer-to-peer networks ushered in a new era of large scale media exchange. Faced with ever increasing volumes of traffic, legal threats by copyright holders, and QoS demands of customers, network service providers are urged to apply traffic classification and shaping techniques.
Zink, Thomas, Waldvogel, Marcel
openaire +2 more sources
IoT-Portrait: Automatically Identifying IoT Devices via Transformer with Incremental Learning
With the development of IoT, IoT devices have proliferated. With the increasing demands of network management and security evaluation, automatic identification of IoT devices becomes necessary.
Juan Wang, Jing Zhong, Jiangqi Li
doaj +1 more source
Identification technique of cryptomining behavior based on traffic features
Recently, the growth of blockchain technology and the economic benefits of cryptocurrencies have led to a proliferation of malicious cryptomining activities on the internet, resulting in significant losses for companies and institutions.
Lijian Dong +4 more
doaj +1 more source
RF-Based Traffic Detection and Identification [PDF]
Road traffic congestion estimation is a critical function that affects both developed and developing countries alike. In this paper, we present Monitor as a novel RF-based traffic detection and identification system. Compared to the current approaches for traffic estimation, Monitor is low-cost, does not disrupt traffic during installation, works for ...
Amal Al-Husseiny, Moustafa Youssef
openaire +1 more source

