Results 11 to 20 of about 76,767 (261)
Machine Learning Based Botnet Identification Traffic [PDF]
The continued growth of the Internet has resulted in the increasing sophistication of toolkit and methods to conduct computer attacks and intrusions that are easy to use and publicly available to download, such as Zeus botnet toolkit. Botnets are responsible for many cyber-attacks, such as spam, distributed denial-of-service (DDoS), identity theft, and
Azab, Ahmad +2 more
openaire +1 more source
Airborne Network Traffic Identification Method under Small Training Samples
Due to the high cost and difficulty of traffic data set acquisition and the high time sensitivity of traffic distribution, the machine learning-based traffic identification method is difficult to be applied in airborne network environment. Aiming at this
doaj +1 more source
A VPN-Encrypted Traffic Identification Method Based on Ensemble Learning
One of the foundational and key means of optimizing network service in the field of network security is traffic identification. Various data transmission encryption technologies have been widely employed in recent years.
Jie Cao +4 more
doaj +1 more source
A Self-Supervised Learning Model for Unknown Internet Traffic Identification Based on Surge Period
The identification of Internet protocols provides a significant basis for keeping Internet security and improving Internet Quality of Service (QoS). However, the overwhelming developments and updating of Internet technologies and protocols have led to ...
Dawei Wei, Feifei Shi, Sahraoui Dhelim
doaj +1 more source
Deep Learning-Based Efficient Analysis for Encrypted Traffic
To safeguard user privacy, critical Internet traffic is often transmitted using encryption. While encryption is crucial for protecting sensitive information, it poses challenges for traffic identification and poses hidden dangers to network security.
Xiaodan Yan
doaj +1 more source
Flow Context and Host Behavior Based Shadowsocks’s Traffic Identification
Cloud Virtual Private Server (VPS) services provide the chance of rapid deployment of anonymous proxy services, becoming an important part of many anonymous proxy solutions.
Xuemei Zeng +6 more
doaj +1 more source
Abnormal Traffic Identification Method Based on Bag of Words Model Clustering [PDF]
In view of the problem that the accuracy of abnormal traffic identification is low and fast identification is dependent on the threshold,an abnormal traffic identification method based on BoW(Bag of Words) model clustering is proposed.By means of K-means
MA Linjin,WAN Liang,MA Shaoju,YANG Ting
doaj +1 more source
Hierarchical Identifier: Application to User Privacy Eavesdropping on Mobile Payment App
Mobile payment apps have been widely-adopted, which brings great convenience to people’s lives. However, at the same time, user’s privacy is possibly eavesdropped and maliciously exploited by attackers.
Yaru Wang +6 more
doaj +1 more source
New DoS Defense Method Based on Strong Designated Verifier Signatures
We present a novel technique for source authentication of a packet stream in a network, which intends to give guarantees that a specific network flow really comes from a claimed origin.
Marcone Pereira de Almeida +3 more
doaj +1 more source
With the rapid development of large-scale enterprise informatization construction, the network scale has become huge and complex, and the data traffic carried by the network is increasing.
Lin Zheng, Junjiao Li
doaj +1 more source

