نتایج جستجو برای: encrypted traffic

تعداد نتایج: 104589  

Journal: :Wireless Communications and Mobile Computing 2023

Currently, the ZigBee protocol is widely used in smart homes and provides convenience to people. However, home devices often carry a large amount of real physical world information, which may result information leakage problems. In this paper, reveal privacy security issues existing ZigBee-based networks, we design analysis system based on ZigBee-encrypted traffic, called ZPA. ZPA can extract d...

Journal: :Security and Communication Networks 2023

While encryption ensures the confidentiality and integrity of user data, more attackers try to hide attack behaviours through encryption, which brings new challenges malicious traffic identification. How effectively detect encrypted without decrypting protecting privacy has become an urgent problem be solved. Most current research only uses a single CNN, RNN, SAE network traffic, does not consi...

Journal: :TIIS 2014
Jae-Hyun Ham Hyun-Min An Myung-Sup Kim

Recently, network traffic has become more complex and diverse due to the emergence of new applications and services. Therefore, the importance of application-level traffic classification is increasing rapidly, and it has become a very popular research area. Although a lot of methods for traffic classification have been introduced in literature, they have some limitations to achieve an acceptabl...

Journal: :J. Network and Computer Applications 2018
Giuseppe Aceto Domenico Ciuonzo Antonio Montieri Antonio Pescapè

The growing usage of smartphones in everyday life is deeply (and rapidly) changing the nature of traffic traversing home and enterprise networks, and the Internet. Different tools and middleboxes, such as performance enhancement proxies, network monitors and policy enforcement devices, base their functions on the knowledge of the applications generating the traffic. This requirement is tightly ...

Journal: :CoRR 2018
Spyridon Mastorakis Tahrina Ahmed Jayaprakash Pisharath

Nowadays, enterprises widely deploy Network Functions (NFs) and server applications in the cloud. However, processing of sensitive data and trusted execution cannot be securely deployed in the untrusted cloud. Cloud providers themselves could accidentally leak private information (e.g., due to misconfigurations) or rogue users could exploit vulnerabilities of the providers’ systems to compromis...

2008
Kevin Borders Atul Prakash

As the Internet grows and network bandwidth continues to increase, administrators are faced with the task of keeping confidential information from leaving their networks. Today’s network traffic is so voluminous that manual inspection would be unreasonably expensive. In response, researchers have created data loss prevention systems that check outgoing traffic for known confidential information...

Journal: :J. Network and Computer Applications 2009
Ying-Dar Lin Chun-Nan Lu Yuan-Cheng Lai Wei-Hao Peng Po-Ching Lin

Traffic classification is an essential part in common network management applications such as intrusion detection and network monitoring. Identifying traffic by looking at port numbers is only suitable to well-known applications, while signature-based classification is not applicable to encrypted messages. Our preliminary observation shows that each application has distinct packet size distribu...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید