نتایج جستجو برای: encrypted traffic

تعداد نتایج: 104589  

2013
Babak Rahbarinia Roberto Perdisci Andrea Lanzi Kang Li

In this paper we present PeerRush, a novel system for the identification of unwanted P2P traffic. Unlike most previous work, PeerRush goes beyond P2P traffic detection, and can accurately categorize the detected P2P traffic and attribute it to specific P2P applications, including malicious applications such as P2P botnets. PeerRush achieves these results without the need of deep packet inspecti...

2017
Siva Nageswara Rao

Cloud storage provides a convenient and more storage at low cost, but data security is a main concept that prevents users from storing documents on the cloud. One of the methods for improving security from the data owner point of view is to encrypt the document before outsourcing them onto the cloud and decrypt the documents after downloading them. In this paper there is some limitation as foll...

Journal: :Cybernetics and Information Technologies 2021

Abstract Intrusion Detection Systems (IDSs) utilise deep learning techniques to identify intrusions with maximum accuracy and reduce false alarm rates. The feature extraction is also automated in these techniques. In this paper, an ensemble of different Deep Neural Network (DNN) models like MultiLayer Perceptron (MLP), BackPropagation (BPN) Long Short Term Memory (LSTM) are stacked build a robu...

Journal: :Computers & Security 2022

As people’s demand for personal privacy and data security becomes a priority, encrypted traffic has become mainstream in the cyber world. However, encryption is also shielding malicious illegal introduced by adversaries, from being detected. This especially so post-COVID-19 environment where growing rapidly. Common solutions that rely on plain payload content analysis such as deep packet inspec...

2006
Charles V. Wright Fabian Monrose Gerald M. Masson

Several fundamental security mechanisms for restricting access to network resources rely on the ability of a reference monitor to inspect the contents of traffic as it traverses the network. However, with the increasing popularity of cryptographic protocols, the traditional means of inspecting packet contents to enforce security policies is no longer a viable approach as message contents are co...

2014
Chunzhi Wang Zeqi Wang Zhiwei Ye Hongwei Chen

Nowadays new peer to peer (P2P) traffic with dynamic port and encrypted technology makes the identification of P2P traffic become more and more difficult. As one of the optimal classifiers, support vector machine (SVM) has special advantages with avoiding local optimum, overcoming dimension disaster, resolving small samples and high dimension for P2P classification problems. However, to employ ...

Journal: :Wireless Communications and Mobile Computing 2022

The encryption of network traffic promotes the development encrypted classification and identification research. However, many existing studies are only effective for closed-set experimental data, that is to say, known classes, while there often lots unknown classes in real environment open sets, have difficulty identifying can misclassify them as classes. How identify classify an open-collecti...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید