نتایج جستجو برای: encrypted traffic
تعداد نتایج: 104589 فیلتر نتایج به سال:
Currently, the ZigBee protocol is widely used in smart homes and provides convenience to people. However, home devices often carry a large amount of real physical world information, which may result information leakage problems. In this paper, reveal privacy security issues existing ZigBee-based networks, we design analysis system based on ZigBee-encrypted traffic, called ZPA. ZPA can extract d...
While encryption ensures the confidentiality and integrity of user data, more attackers try to hide attack behaviours through encryption, which brings new challenges malicious traffic identification. How effectively detect encrypted without decrypting protecting privacy has become an urgent problem be solved. Most current research only uses a single CNN, RNN, SAE network traffic, does not consi...
Recently, network traffic has become more complex and diverse due to the emergence of new applications and services. Therefore, the importance of application-level traffic classification is increasing rapidly, and it has become a very popular research area. Although a lot of methods for traffic classification have been introduced in literature, they have some limitations to achieve an acceptabl...
The growing usage of smartphones in everyday life is deeply (and rapidly) changing the nature of traffic traversing home and enterprise networks, and the Internet. Different tools and middleboxes, such as performance enhancement proxies, network monitors and policy enforcement devices, base their functions on the knowledge of the applications generating the traffic. This requirement is tightly ...
Nowadays, enterprises widely deploy Network Functions (NFs) and server applications in the cloud. However, processing of sensitive data and trusted execution cannot be securely deployed in the untrusted cloud. Cloud providers themselves could accidentally leak private information (e.g., due to misconfigurations) or rogue users could exploit vulnerabilities of the providers’ systems to compromis...
As the Internet grows and network bandwidth continues to increase, administrators are faced with the task of keeping confidential information from leaving their networks. Today’s network traffic is so voluminous that manual inspection would be unreasonably expensive. In response, researchers have created data loss prevention systems that check outgoing traffic for known confidential information...
Traffic classification is an essential part in common network management applications such as intrusion detection and network monitoring. Identifying traffic by looking at port numbers is only suitable to well-known applications, while signature-based classification is not applicable to encrypted messages. Our preliminary observation shows that each application has distinct packet size distribu...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید