نتایج جستجو برای: encrypted traffic
تعداد نتایج: 104589 فیلتر نتایج به سال:
In this paper we present PeerRush, a novel system for the identification of unwanted P2P traffic. Unlike most previous work, PeerRush goes beyond P2P traffic detection, and can accurately categorize the detected P2P traffic and attribute it to specific P2P applications, including malicious applications such as P2P botnets. PeerRush achieves these results without the need of deep packet inspecti...
Cloud storage provides a convenient and more storage at low cost, but data security is a main concept that prevents users from storing documents on the cloud. One of the methods for improving security from the data owner point of view is to encrypt the document before outsourcing them onto the cloud and decrypt the documents after downloading them. In this paper there is some limitation as foll...
Abstract Intrusion Detection Systems (IDSs) utilise deep learning techniques to identify intrusions with maximum accuracy and reduce false alarm rates. The feature extraction is also automated in these techniques. In this paper, an ensemble of different Deep Neural Network (DNN) models like MultiLayer Perceptron (MLP), BackPropagation (BPN) Long Short Term Memory (LSTM) are stacked build a robu...
Distributed real-time SlowDoS attacks detection over encrypted traffic using Artificial Intelligence
As people’s demand for personal privacy and data security becomes a priority, encrypted traffic has become mainstream in the cyber world. However, encryption is also shielding malicious illegal introduced by adversaries, from being detected. This especially so post-COVID-19 environment where growing rapidly. Common solutions that rely on plain payload content analysis such as deep packet inspec...
Several fundamental security mechanisms for restricting access to network resources rely on the ability of a reference monitor to inspect the contents of traffic as it traverses the network. However, with the increasing popularity of cryptographic protocols, the traditional means of inspecting packet contents to enforce security policies is no longer a viable approach as message contents are co...
Nowadays new peer to peer (P2P) traffic with dynamic port and encrypted technology makes the identification of P2P traffic become more and more difficult. As one of the optimal classifiers, support vector machine (SVM) has special advantages with avoiding local optimum, overcoming dimension disaster, resolving small samples and high dimension for P2P classification problems. However, to employ ...
The encryption of network traffic promotes the development encrypted classification and identification research. However, many existing studies are only effective for closed-set experimental data, that is to say, known classes, while there often lots unknown classes in real environment open sets, have difficulty identifying can misclassify them as classes. How identify classify an open-collecti...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید