نتایج جستجو برای: encrypted traffic

تعداد نتایج: 104589  

Journal: :IEEE Access 2021

A detection model of Internet Things encrypted traffic based on edge intelligence is proposed in the paper, which can reduce communication times distributed gateways process as well establishment time, order to solve problems that it difficult carry out efficient classification and accurate identification Things. In this four new methods for are put forward, namely time-sequence behavior analys...

Nowadays, users of information systems have inclination to use a central server to decrease data transferring and maintenance costs. Since such a system is not so trustworthy, users' data usually upkeeps encrypted. However, encryption is not a nostrum for security problems and cannot guarantee the data security. In other words, there are some techniques that can endanger security of encrypted d...

2008
Riyad Alshammari A. Nur Zincir-Heywood

The objective of this work is the comparison of two types of feature sets for the classification of encrypted traffic such as SSH. To this end, two learning algorithms – RIPPER and C4.5 – are employed using packet header and flow-based features. Traffic classification is performed without using features such as IP addresses, source/destination ports and payload information. Results indicate tha...

2013
Maciej Korczyński Gilles Berger-Sabbatel Andrzej Duda

In this paper, we present two ways of detecting malware. The first one takes advantage of a platform that we have developed. The platform includes tools for capturing malware, running code in a controlled environment, and analyzing its interactions with external entities. The platform enables us to detect malware based on the observation of its communication behavior. The second approach uses a...

2005
Satoshi Ohzahata Yoichi Hagiwara Matsuaki Terada Konosuke Kawashima

Pure P2P applications are widely used nowadays as a file sharing system. In the overlay networks, music and video files are the main items exchanged, and it is known that the traffic volume is much larger than that of classical client/server applications. However, the current status of the P2P application traffic is not well known because of their anonymous communication architectures. In parti...

2009
Gianluca Maiolini Andrea Baiocchi Alfonso Iacovazzi Antonello Rizzi

The identification of application flows is a critical task in order to manage bandwidth requirements of different kind of services (i.e. VOIP, Video, ERP). As network security functions spread, an increasing amount of traffic is natively encrypted due to privacy issues (e.g. VPN). This makes ineffective current traffic classification systems based on ports and payload inspection, e.g. even powe...

2010
Andrea Bittau Michael Hamburg Mark Handley David Mazières Dan Boneh

Today, Internet traffic is encrypted only when deemed necessary. Yet modern CPUs could feasibly encrypt most traffic. Moreover, the cost of doing so will only drop over time. Tcpcrypt is a TCP extension designed to make end-to-end encryption of TCP traffic the default, not the exception. To facilitate adoption tcpcrypt provides backwards compatibility with legacy TCP stacks and middleboxes. Bec...

2007
Cynthia McLain Ahren Studer Richard Lippmann

Network-based intrusion detection systems (NIDSs) are one component of a comprehensive network security solution. The use of IPsec, which encrypts network traffic, renders network intrusion detection virtually useless unless traffic is decrypted at network gateways. One alternative to NIDSs, host-based intrusion detection systems (HIDSs), provide some of the functionality of NIDSs but with limi...

2012
Yu Liu

In this paper, I will categories and analysis different approaches to classify different Internet traffics using Machine Learning (ML) technic. The traffic classification can be used as an important tool to detect intrusion detection. And it also can be used by network operator to control the network. However it opens a topic related to protection of personal information. After realizing the ad...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید