نتایج جستجو برای: encrypted traffic
تعداد نتایج: 104589 فیلتر نتایج به سال:
Due to growth of Cloud computing usage, the need to apply encrypted protocols to provide confidentiality and integrity of data increases dramatically. Attacker can take advantage of these protocols to hide the intrusion and evade detection. Many traditional attack detection techniques have been proposed to provide security in the networks but none of them can be implemented properly in encrypte...
The evergrowing diversity of encrypted and anonymous network traffic makes management more formidable to manage the traffic. An intelligent system is essential analyse identify accurately. Network needs such techniques improve Quality Service ensure flow secure However, due usage non-standard ports encryption data payloads, classical port-based payload-based classification fail classify secured...
The sharp increasing volume of encrypted traffic generated by malware brings a huge challenge to traditional payload-based malicious detection methods. Solutions that based on machine learning and deep are becoming mainstream. However, the learning-based methods limited manual-design features, which have problem highly correlated multicollinearity. And both rely heavily large number labeled sam...
الحاق و پیوند ترافیک از جفت فرستنده-گیرنده های مختلف به مسیر نوری پرظرفیت ، آرایش ترافیک یا همان traffic grooming نامیده می شود. در این پایان نامه، به بررسی و ارائه الگوریتمی جهت آرایش ترافیک (traffic grooming) در شبکه های ip-over-wdm می پردازیم که برپایه بهینه سازی به روش کلونی مورچه ها (acs) بنا شده است و از تابع احتمالی که به دو پارامتر هزینه و مقدار فرومون وابسته است استفاده می کند. در ادا...
1077-3142/$ see front matter 2010 Elsevier Inc. A doi:10.1016/j.cviu.2009.06.009 q A demo video of the system can be downloaded ~ekenel/door_monitoring.mpg. * Corresponding author. E-mail addresses: [email protected] (H.K. Ekenel Stallkamp), [email protected] (R. Stiefelhage URLs: http://cvhci.ira.uka.de/~ekenel/ (H.K. Eke ~stiefel/ (R. Stiefelhagen). 1 Present address: Ruhr-Universität-...
Recent studies estimate that peer-to-peer (p2p) traffic comprises 40-70% of today’s Internet traffic [1]. Surprisingly, the impact of p2p traffic on anomaly detection has not been investigated. In this paper, we collect and use a labeled dataset containing diverse network anomalies (portscans, TCP floods, UDP floods, at varying rates) and p2p traffic (encrypted and unencrypted with BitTorrent, ...
As the number of applications based on Internet is increasing, traffic becomes more and complex. So how to improve service quality security network becoming important. This paper studies application support vector machine in identification classify traffic. Through data collection feature generation methods screening methods, used as a classifier by using generalization capability machine, para...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید